EP2115627B1 - Synchronization methods and systems - Google Patents
Synchronization methods and systems Download PDFInfo
- Publication number
- EP2115627B1 EP2115627B1 EP08712962.3A EP08712962A EP2115627B1 EP 2115627 B1 EP2115627 B1 EP 2115627B1 EP 08712962 A EP08712962 A EP 08712962A EP 2115627 B1 EP2115627 B1 EP 2115627B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- synchronization
- host
- data
- data class
- synchronized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 137
- 230000008569 process Effects 0.000 claims description 91
- 230000001360 synchronised effect Effects 0.000 claims description 83
- 238000012545 processing Methods 0.000 claims description 82
- 230000004044 response Effects 0.000 claims description 18
- 230000008859 change Effects 0.000 claims description 10
- 239000003795 chemical substances by application Substances 0.000 description 36
- 230000015654 memory Effects 0.000 description 34
- 238000013507 mapping Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 12
- 230000001413 cellular effect Effects 0.000 description 10
- 238000001914 filtration Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 230000032258 transport Effects 0.000 description 7
- 239000003999 initiator Substances 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000000844 transformation Methods 0.000 description 3
- 239000013543 active substance Substances 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 244000144992 flock Species 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000011093 media selection Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001131 transforming effect Effects 0.000 description 2
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 229910000078 germane Inorganic materials 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000035772 mutation Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/10—Program control for peripheral devices
- G06F13/102—Program control for peripheral devices where the programme performs an interfacing function, e.g. device driver
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
- G06F15/161—Computing infrastructure, e.g. computer clusters, blade chassis or hardware partitioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
- G06F15/163—Interprocessor communication
- G06F15/167—Interprocessor communication using a common memory, e.g. mailbox
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
Definitions
- the various examples and embodiments described herein relate to systems and methods for synchronizing data between two or more data processing systems such as a desktop computer system and a handheld computer system.
- the invention particularly relates to a machine implemented method for synchronization between a device and a host, wherein the device and the host are physically separated and a link software component maintains an authenticated connection link between the device and the host, thereby allowing passing of commands and data between the device and the host during the synchronization process.
- the invention also relates to a computer readable storage medium containing executable program instructions, and a device.
- Modern data processing systems such as a general purpose computer, a handheld computer, a cellular telephone, media players, etc. have been reduced in size to the point that they can often be readily carried around by a user.
- these devices are powerful enough that they can provide substantial computing power to allow a user to maintain contact information, maintain calendar information, provide email functionality, and even provide web browsing.
- These devices also may include support for a task or a To Do list or database and other sources of data for a user.
- An example of a small handheld computer is the Palm Treo, and other examples of handheld computers include those which run a Windows CE operating system.
- handheld computers typically allow a user to synchronize their data between the handheld computer and another computer, such as a user's desktop computer, such that both computers maintain the same set of information, such as the same calendar for the user, thereby allowing the user to view their calendar on either the desktop computer or the handheld computer.
- the synchronization is typically performed by coupling together the host computer with a handheld computer through a mechanical and electrical connection provided by a dock.
- Figure 1 shows an example in the prior art of a handheld computer being coupled mechanically and electrically to a host computer through the dock 26.
- the system 10 includes the host computer 12 and the handheld computer 14.
- Synchronization software 16 running on the host, performs the synchronization between the respective databases, such as the contacts database 18 which is synchronized with the handheld contacts database 20.
- the synchronization software 16 synchronizes the calendar database 22 on the host computer with the handheld's calendar database 24. Synchronization software 16 on the host computer can synchronize each of the databases separately through the use of "conduits.”
- the synchronization software 16 opens and maintains a data connection link through a conduit, and each conduit must implement all the software needed to make and maintain the link in order to synchronize a particular database.
- the handheld computer merely acts as a storage device by vending its storage memory, such as a hard drive or a flash memory, to the host computer which, through the synchronization software 16, opens each database to perform the synchronization.
- the synchronization software 16 on the host computer 12 performs the synchronization operations for both sets of databases on both devices.
- the synchronization agent on the handheld computer it does not have the facilities and architecture described in this disclosure, including, for example, providing a plug-in model on both the handheld and the host for different data classes, and does not allow applications on the handheld computer to run concurrently with the synchronization process, and various other features described herein.
- Certain systems also allow for the synchronization of bookmarks for web browsing between a host and a handheld computer. These systems allow for the synchronization of a set of bookmarks having the same format in both the handheld and the host. Certain synchronization systems are described under the name "SyncML" and further information about these systems can be found at www.openmobilealliance.org and at www.openmobilealliance.org/tech/affiliates/syncml/syncmlindex.html.
- SyncML is a specification for a common data synchronization framework and XML-based format, or representation protocol, for synchronizing data on network devices.
- SyncML is designated fro use between mobile devices that are intermittently connected to the network and network services that are continuously available on the network.
- SyncML can also be used for peer-to-peer data synchronization.
- SyncML is specifically designed to handle the case where the network services and the mobile devices store the data they are synchronizing in different formats or use different software systems.
- SyncML Sync Protocol version 1
- SYNCML SYNC PROTOCOL XX, XX, no. version 1.0, 7 December 2000 (2000-12-07), pages 1-60, XP002955174 , further defines a synchronization protocol between a SyncML client and servber in form of message sequence charts.
- SyncML Device Information DTD 7 December 2000 (2000-12-07), XP002665278, URL:http://xml.coverpages.org/symbol/synccml_devinf_v10_2001207.pdf [retreived on 2011-12-08] defines the Document Type Definition (DTD) for the XML representation of the Device Information document.
- the document describes the capabilities of the device and is used in SyncML data synchronization protocol operations.
- US 6 460 01 B1 describes a system and a method for synchronizing information in datasets via a communication medium that is susceptible to high latency, non-FIFO delivery order, or other adverse characteristics.
- the disclosed synchronization method relates to a first data set with at least a second data set including a step of storing information that is indicative of a first version of user data and a second version of user data.
- US 6 324 544 B1 discloses first and second devices each containing an object store which stores objects indicative of file data, Synchronization components are provided to synchronize the objects while efficiently overcoming problems associated with synchronizing files.
- This description relates to systems, methods and computer readable media which allow for synchronization tasks and non-synchronization tasks to be executed concurrently.
- a method includes executing at least one non-synchronization processing thread, such as at least one user-level non-synchronization processing thread, and executing at least one synchronization processing thread concurrently with the executing of the at least one non-synchronization processing thread.
- the execution of at least one non-synchronization processing thread may include operations to access a first database which is synchronized by the at least one synchronization processing thread during a synchronization operation between the first database on a first data processing system and a second database on a second data processing system.
- a method as described herein allows a user to operate both a host and a device while the two systems are performing synchronization operations.
- a user may manipulate or view a calendar while a synchronization operation, which synchronizes structured data from, for example, the calendar or other databases such as a contact database, is being performed.
- the at least one synchronization processing thread may be provided by a synchronization software component which is configured to cause retrieval and storage of structured data from a first store and wherein the at least one user-level non-synchronization processing thread is provided by a user application which provides a user interface to allow a user to access and edit the structured data in the first store.
- a synchronization software component acquires a lock on the first store in order to prevent the user application from affecting the first store while a synchronization process is occurring.
- the synchronization software component attempts to acquire the lock, and if it fails to do so, the synchronization software component sends a message to the user application to obtain the lock on the first store.
- the lock in certain embodiments, may be the FLOCK Unix command.
- the synchronization software component may cancel synchronization for at least one data class if the user application fails to release the lock on the first store after a period of time subsequent to sending of the message.
- the present invention can relate to an apparatus for performing one or more of the operations described herein.
- This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer.
- a computer program may be stored in a machine (e.g. computer) readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), erasable programmable ROMs (EPROMs), electrically erasable programmable ROMs (EEPROMs), magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a bus.
- ROMs read-only memories
- RAMs random access memories
- EPROMs erasable programmable ROMs
- EEPROMs electrically erasable programmable ROMs
- magnetic or optical cards or any type of media suitable
- a machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer).
- a machine-readable medium includes read only memory ("ROM”); random access memory (“RAM”); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
- FIGS. 2 and 3 show examples of two different data processing systems, where the system shown in Figure 2 may be referred to as a host while the system shown in Figure 3 may be referred to as a device, although the system shown in Figure 2 may be referred to as a device while the system shown in Figure 3 may be referred to as a host.
- Figure 2 shows one example of a computer system which is a form of a data processing system. Note that while Figure 2 illustrates various components of a computer system, it is not intended to represent any particular architecture or manner of interconnecting the components as such details are not germane to the present inventions. It will also be appreciated that personal digital assistants (PDAs), cellular telephones, media players (e.g. an iPod), devices which combine aspects or functions of these devices (a media player combined with a PDA and a cellular telephone in one device), network computers, an embedded processing device within another device, and other data processing systems which have fewer components or perhaps more components may also be used to implement one or more embodiments of the present inventions and may be one or more of the data processing systems described herein.
- the computer system shown in Figure 2 may, for example, be a Macintosh computer from Apple Computer, Inc. or a computer which runs the Windows operating software from Microsoft Corporation.
- the computer system 45 includes a bus 51 which is coupled to one or more microprocessors which form a processing system 47.
- the bus 51 is also coupled to memory 49 and to a non-volatile memory 50, which may be a magnetic hard drive in certain embodiments, or flash memory in other embodiments.
- the bus is also coupled to a display controller and display 52 and one or more input/output (I/O) devices 53.
- the bus is coupled to an optional dock 54 and to one or more wireless transceivers 55, which may be a Bluetooth transceiver or a WiFi transceiver or an infrared transceiver. It will be appreciated that the wireless transceivers 55 are optional as shown in Figure 2 .
- the processing system 47 may optionally be coupled to optional cache 48.
- the processing system 47 may include one or more microprocessors, such as a microprocessor from Intel or IBM.
- the bus 51 interconnects these various components together in a manner which is known in the art.
- the input/output devices 53 are coupled to the system through input/output controllers.
- the memory 49 may be implemented as dynamic RAM (DRAM) which provides fast access to data but requires power continually in order to refresh or maintain the data in the memory.
- the non-volatile memory 50 may be a magnetic hard drive or other non-volatile memory which retains data even after power is removed from the system.
- Non-volatile memory 50 is a local device coupled directly to the rest of the components in the data processing system
- a non-volatile memory which is remote from a system, such as a network storage device, which is coupled to the data processing system through a network interface, such as a modem or an Ethernet interface.
- the bus 51 may include one or more buses connected to each other through various bridges, controllers, and/or adapters as is known in the art.
- the I/O controller 53 may include a USB adapter for controlling USB peripherals and an IEEE-1394 controller for IEEE-1394 compliant peripherals.
- aspects of the inventions may be embodied, at least in part, in software. That is, the techniques may be carried out in a computer system or other data processing system in response to its processor or processing system executing sequences of instructions contained in a memory, such as memory 49 or non-volatile memory 50 or the memory 63 shown in Figure 3 .
- a memory such as memory 49 or non-volatile memory 50 or the memory 63 shown in Figure 3 .
- hardwired circuitry may be used in combination with the software instructions to implement the present inventions.
- the techniques are not limited to any specific combination of hardware circuitry and software nor to any particular source for the instructions executed by the data processing system.
- various functions and operations are described as being performed by or caused by software code to simplify description. However, those skilled in the art will recognize that what is meant by such expressions is that the functions result from execution of the code by a processing system.
- the dock 54 and/or the wireless transceivers 55 provide a physical interface for coupling the data processing system shown in Figure 2 to another data processing system, such as the data processing system shown in Figure 3 , or to another data processing system which resembles the system shown in Figure 2 .
- the dock 54 may be similar to a dock in the prior art, such as the dock 26, such that it provides both a mechanical and electrical connection between one data processing system and another data processing system to allow a synchronization process to be performed between the two systems.
- the wireless transceivers 55 may provide an electrical connection between the two systems for the purpose of a synchronization process without providing a mechanical connection between the two systems.
- FIG 3 shows an example of another data processing system which may synchronize data with other data processing systems, such as the system shown in Figure 2 or a system which is similar to that shown in Figure 3 .
- the data processing system 60 shown in Figure 3 includes a processing system, which may be one or more microprocessors, or which may be a system on a chip integrated circuit, and the system also includes memory 63 for storing data and programs for execution by the processing system.
- the system 60 also includes an audio input/output subsystem 64 which may include a microphone and a speaker for, for example, playing back music or providing telephone functionality through the speaker and microphone.
- a display controller and display device 65 provide a visual user interface for the user; this digital interface may include a graphical user interface which is similar to that shown on a Macintosh computer when running OS X operating system software.
- the system 60 also includes one or more wireless transceivers, such as a WiFi transceiver, an infrared transceiver, a Bluetooth transceiver, and/or a wireless cellular telephony transceiver. It will be appreciated that additional components, not shown, may also be part of the system 60 in certain embodiments, and in certain embodiments fewer components than shown in Figure 3 may also be used in a data processing system.
- the data processing system 60 also includes one or more input devices 66 which are provided to allow a user to provide input to the system.
- the data processing system 60 also includes an optional input/output device 67 which may be a connector for a dock, such as the dock 54 shown in Figure 2 . It will be appreciated that one or more buses, not shown, may be used to interconnect the various components as is well known in the art.
- the data processing system shown in Figure 3 may be a handheld computer or a personal digital assistant (PDA), or a cellular telephone with PDA-like functionality, or a handheld computer which includes a cellular telephone, or a media player, such as an iPod, or devices which combine aspects or functions of these devices, such as a media player combined with a PDA and a cellular telephone in one device.
- the data processing system 60 may be a network computer or an embedded processing device within another device, or other types of data processing systems which have fewer components or perhaps more components than that shown in Figure 3 .
- At least certain embodiments of the inventions may be part of a digital media player, such as a portable music and/or video media player, which may include a media processing system to present the media, a storage device to store the media and may further include a radio frequency (RF) transceiver (e.g., an RF transceiver for a cellular telephone) coupled with an antenna system and the media processing system.
- RF radio frequency
- media stored on a remote storage device may be transmitted to the media player through the RF transceiver.
- the media may be, for example, one or more of music or other audio, still pictures, or motion pictures.
- the portable media player may include a media selection device, such as a click wheel input device on an iPod® or iPod Nano® media player from Apple Computer, Inc. of Cupertino, CA, a touch screen input device, pushbutton device, movable pointing input device or other input device.
- the media selection device may be used to select the media stored on the storage device and/or the remote storage device.
- the portable media player may, in at least certain embodiments, include a display device which is coupled to the media processing system to display titles or other indicators of media being selected through the input device and being presented, either through a speaker or earphone(s), or on the display device, or on both display device and a speaker or earphone(s). Examples of a portable media player are described in published U.S. patent application numbers 2003/0095096 and 2004/0224638 , both of which are incorporated herein by reference.
- the data processing system 60 may be implemented in a small form factor which resembles a handheld computer having a tablet-like input device which may be a multi-touch input panel device which is integrated with a liquid crystal display. Examples of such devices are provided in U.S. Patent Application No. 11/586,862, filed October 24, 2006 , and entitled "AUTOMATED RESPONSE TO AND SENSING OF USER ACTIVITY IN PORTABLE DEVICES," which is assigned to the same assignee as the instant application. This foregoing application is hereby incorporated herein by reference.
- these various software components may be stored in the memory 49 and/or memory 50 shown in Figure 2 for one type of data processing system, and in the case of a system such as that shown in Figure 3 , these various different software components may be stored in the memory 63 which may include volatile memory as well as non-volatile memory, such as flash memory or a magnetic hard drive.
- Figure 4 shows an example of an embodiment of a particular software architecture for a synchronization system between one or more data processing systems, such as a device, which may be a handheld computer, and a host, which may be a desktop or a laptop computer.
- This software architecture may be used to implement one or more of the various embodiments described herein, such as the methods shown in Figures 5 , 6A , 6B , 7A , and 7B , and Figures 8A and 8B .
- This synchronization system may be used to synchronize structured data, such as data in a contacts or address database. Different data typically have different structures or formats which specify how the data is organized and formatted.
- Figures 9A and 9B provide examples of two different structured data formats for two different data classes.
- Figure 9A shows a data format for a contacts data class
- Figure 9B shows a format for a calendar data class format.
- the synchronization system shown in Figure 4 may be used to synchronize calendar data between two different calendar stores on the two different systems and to also synchronize contact data between the two contact stores on the two systems as will be described further below.
- the software architecture shown in Figure 4 includes a plurality of software components on the device side 101 and a plurality of software components on the host side 103.
- device link software 107 which in effect bridges the connection between the two software components which are separated by the line 105 which represents the physical separation between the device and the host.
- the device includes one or more user application programs which are used to access and edit structured data in a particular data class.
- Figure 4 shows examples of three such user application programs.
- calendar application program 125 is used to access and edit calendar data in the calendar store database 119.
- the contacts application program is used by a user to access and edit contacts or address book information stored in the contacts store database 121.
- the other application programs 129 which may include a notes application program, widget programs for presenting widgets, a web browser having bookmarks, an email program which includes email account setup information, a To Do list program, and possibly other programs which have structured data, are represented by the other application programs 129 which have access to and provide the ability to edit information in other stored databases 123.
- These user application programs such as application programs 125 and 127, are separate from the synchronization software components which are responsible for synchronizing structured data in each of the different classes. These software components are shown in Figure 4 as data sources 113, 115, and 117.
- the calendar data source 113 is responsible for causing the retrieval and storage of the structured data from its particular data class, which is the calendar data class, during a synchronization process.
- the contacts data source 115 is responsible for causing the retrieval and storage of structured data in the contacts stored database 121, which may represent the user's address book or other contact information database.
- other data sources such as other data sources 117, are responsible for causing the retrieval and storage of structured data from other structured data stores. This may include databases for notes, emails, bookmarks, and/or To Do lists and other databases or stores of data.
- the data sources may also perform other functions, such as formatting the data either for storage on the device or for transmission to the host, transmitting and/or receiving version identifiers with respect to each data source relative to each data class handler for a particular data class, sending device and host anchors as described herein in order to ensure that synchronization operations are performed as atomic transactions to ensure that the synchronization is either completed or not, allowing the system to roll back to a prior state if it is not completed (in order to ensure that synchronization can be performed even if the connection is interrupted). Further, the data sources may also remap unique identification values for records on the device to records on the host so that the device can maintain a unique record regardless of a record ID (identifier) provided by a host.
- identifier identifier
- Each data source is coupled through software based messages to a sync agent software component 109 which is responsible for, at least in part, maintaining a data connection between the device and the host through a device link software stack 107, an example of which is shown in Figure 10 and described herein.
- the sync agent 109 provides services, through software based messages, such as calls or APIs (Application Program Interface), to various data sources.
- the sync agent 109 may implement or handle or determine the order of synchronization of the various data classes by specifying directly or indirectly the order. For example, the sync agent 109 may determine and specify that the calendar data class is synchronized first and then the contacts data class is synchronized next and then the To Do list data class is synchronized next, etc.
- the sync agent 109 may receive the order through one or more commands or messages from the sync client and, in turn, may implement that order by sending messages to the data sources in that order.
- the sync agent 109 also alerts a data source if a link fails when synchronization is occurring, and it will tell the data source to roll back to a prior synchronization state if the link fails before synchronization is completed. Further, the sync agent may ask a data source to commit changes if the synchronization has been successful, which causes the data source to write the data to a particular store for the particular data class.
- the software architecture of Figure 4 provides abstractions that allow plugging in of many different data classes; including "after market” plug-ins by third party suppliers in at least certain embodiments.
- this architecture creates a "sync client” which is split into two pieces (one on the host in the form of synch client 111 and one on the device in the form of sync agent 109) and uses a sync server, in the form of sync services 141, which operates with both the synch client 111 and the sync agent 109.
- the device in an embodiment in this architecture, does not interact directly with the sync server (e.g. sync services 141) but instead exchanges messages with the sync client 111 which interacts (through software based messages) with the sync server.
- the Sync Server manages storing, comparing (mingling), and differencing data from various clients (applications, other servers, and Sync Client for a device).
- the Sync Client manages the connection (with authentication and cryptography) to the device, transferring and modifying data between the device and the computer, as well as handling sync anchors, control flow to arbitrate between the sync server and the device, checking versioning of data classes, and providing a plug-in model to optimize and organize handling of different data classes (DataClassHandlers).
- the Sync Client in one embodiment, also does all the filtering (only syncing contacts in specific groups, or events in specific calendars, events within a date range, a subset of mail accounts, and notes or note attachments with a size threshold).
- SyncAgent has a plug-in model for Data Sources, and runs as a separate process from applications on the device which manage/display the data, but can interact with them in parallel (with locking, or concurrent access), and notifies the applications when data changes.
- the device link software component 107 includes a plurality of software components, such as the layers of software components shown in Figure 10 , and the device link 107 maintains, in at least one embodiment, an authenticated connection link between the device and the host, thereby allowing the passing of commands and data between the two data processing systems during the synchronization process.
- the device link software components 107 also provide for, in at least certain embodiments, the connection to be used for additional applications to transfer other information back and forth between the device and the host including, but not limited to, a backup application or a configuration application and diagnostic tools. Further details with respect to the device link 107 are provided below in connection with Figures 10 , 11 , and 12 .
- at least a portion of the device link software stack may reside on both the device and the host memory. In preferred embodiments, a portion of the device link software stack resides and executes on both the device and the host.
- the device link software component 107 provides for a communication link between the sync agent 109 executing on the device 101 and the sync client 111 executing on the host 103.
- the device link 107 passes software based messages, such as calls and responses to calls, between software components as well as the structured data prepared in a format for synchronization in at least certain embodiments.
- the sync client 111 operates, at least in part, to maintain an authenticated connection between the host and device in at least certain embodiments.
- the sync client in one embodiment, may send device and host anchors as described herein, and may cause the saving of next device and next host anchors in response to a successful synchronization for a particular data class as described further herein.
- the sync client will determine the synchronization mode as described further below and will also invoke the correct data class handler for a particular data class to manage the handling of data during the synchronization session for that data class, such as determining the entity types which are to be synchronized for that data class, transforming records to and from the device, determining the order to pull changes from the sync server (sync services) based on entity type, and to perform filtering on records pulled from the sync server (sync services).
- the sync client 111 is coupled to a data class handler for each data class which is supported by the host.
- each of these data class handlers is dedicated to providing synchronization services during a synchronization process for a particular data class.
- the data class handler will format calendar data obtained from a calendar data store 143A so that such data may be transmitted to the device for storage on the calendar store 119.
- the data class handler may format data received from the device so that it may be stored in a database on the host.
- the data class handler may perform, in at least certain embodiments, reformatting operations on data received from the device 101.
- the data class handlers for each data class may perform one or more functions for that particular data class.
- the data class handler may cause the retrieval and storage of structured data from the store for that data class.
- the data class handler may format data for the device, and may filter structured data when synchronizing data. This filtering may be based upon a group, such as a personal group or business group for a contacts data store or may be based on size, such as for a notes data store as described further below.
- a data class handler may send its version identifier to its corresponding data source for a particular data type on the device and may receive an identifier of the version of the data source for that particular data class.
- a data class handler may create a new filter based on new records sent to the device or received from the device or perform operations with respect to modifying filters, such as a filter based on group or size or other parameters, as a result of the synchronization process, and SyncClient will save the modified filters.
- SyncClient may cause the saving of remapped identifiers obtained from the device for records on the device as described herein.
- a data class handler for a particular class will typically be executing at the same time as a data source of the same class on the device.
- These two software components together with a sync agent on the device and the sync client on the host, form active agents on both data processing systems which are active in executing software components as part of the synchronization process.
- the data class handlers may not directly cause the storage and retrieval of structured data from data stores on the host. They transmit messages to the sync client 111 which in turn requests the sync services 141 which may in turn directly or indirectly cause retrieval and storage from the calendar stored database 143A or the contacts stored database 145A or other stored databases 147A.
- Sync Client drives the saving and retrieval process, and gets data from sync services, and calls out to functions in the Data Class handler.
- the Sync Client asks the data class handler what entity types to synchronize with sync services. When it gets records it asks the data class handler to transform them for the device (note that the data class handler might return the same record untransformed in many cases).
- the Sync Client wires the Data Class Handler directly to the Sync Server (sync services) for purposes of filtering, so that the sync server directly asks the DataClassHandler whether or not to filter a record, and then the Sync Client asks the Data Class Handler (both after it has finished pushing records from the device and after it has pulled records from sync services for the device).
- the Data Class Handler is "responsive;" it responds to requests from the Sync Client (and in the case of filtering, the Sync Server), and it is the Sync Client that is the active agency responsible for controlling the sync operation on the host side.
- the host may also include user application programs, such as a calendar application program 143, a contacts application program 145, and other application programs 147 which are used by a user to access and edit corresponding data classes having structured data stored in a corresponding stored database, such as a calendar stored database 143A.
- the architecture shown in Figure 4 shows the data stores on the host side as being coupled directly to the application program; it will be appreciated that there is typically a file management system on a host data processing system which manages each database and which receives calls or other requests from software components such as the application programs 143 or 145 or other components, such as data class handlers or the sync services 141 in order to affect reading and writing of data to a particular stored database.
- Figure 5 shows a flow chart indicating various actions and operations which occur on the host and the device over time during a typical synchronization process according to at least one example.
- the vertical line down the center separates the host operations and actions from the device's operations and actions and also represents the progress of time during a synchronization operation.
- the host 177 may begin the synchronization by connecting to the device and authenticating with the device in operation 179.
- This may be a two-way authentication using self-signed certificates and a self-assigned certificate authority from the host.
- An example of a collection of certificates which may be used in connection with a two-way authentication is shown in Figure 12 .
- This authentication may be encrypted with public key/private key cryptography so that the security level is relatively high.
- the device 175 responds with a ready signal 181.
- the host indicates that it wants to begin a synchronization operation for data class A (or the next data class) as shown in operation 183.
- synchronization is performed for one data class at a time by one data source and one data class handler on the device and the host, respectively, at least in those embodiments which use the software architecture of Figure 4 .
- the device responds with an acknowledgement in operation 185 indicating that it is capable of performing a synchronization operation on data class A because it has the necessary software components, such as a data source for the data class A. If the device does not have the necessary software components to perform the synchronization, it will indicate that synchronization cannot proceed.
- the device and the host perform automatic checking, without user intervention, for the support to synchronize one or more data classes. This automatic checking of support for each data class may be performed separately for all data classes or selected data classes on both the device and the host. In at least certain examples, the device and/or host may decide, based on dynamic conditions and states, not to synchronize a data class at a particular time.
- the device and/or host may not synchronize that data class in the current synchronization process.
- the host in operation 187, sends its version number for the particular data class handler for data class A.
- the device in operation 189, sends its version number for its data source for data class A.
- each of the device and the host receive both version numbers and can perform a comparison to determine which software component to use to decide whether and how to synchronize the structured data in data class A.
- the higher version number indicates the later version of the software component.
- the later software component it is preferred to use the later software component to decide whether and how to synchronize for a particular data class.
- the advantage of using the later software component is that it has knowledge of prior formats, generally, and hence will understand how to deal with prior formats as well as supporting newer formats.
- the device will decide how to handle the synchronization if it can be performed.
- the data class handler on the host is the later version of the software component in this comparison, then the host may decide how to perform the synchronization for the particular data class. Further information in connection with this comparison of version numbers is provided in conjunction with a discussion of Figures 8A and 8B below.
- the host sends a next host anchor and the previous device anchor to the device.
- the device sends its next device anchor and the previous host anchor.
- the host and the device respectively may also transmit to the other system a synchronization type, which indicates a particular type of synchronization which the sending system thinks it needs to perform in the current synchronization operation.
- a synchronization type which indicates a particular type of synchronization which the sending system thinks it needs to perform in the current synchronization operation.
- the type of synchronization requested by each device is considered in a synchronization type negotiation.
- both systems will send the same synchronization type (e.g. a changes type), but in some instances, one system may request a complete or slow synchronization while another will request a changes (fast) synchronization, and in such instance, in at least one example, the two systems will negotiate to select the "worst" synchronization operation in the sense of time. Since the complete synchronization takes longer than a changes synchronization, in most cases, the complete synchronization (a "slow” synchronization) will be selected over a fast synchronization (a "changes" synchronization).
- the negotiation of the type of synchronization is performed with knowledge of the status of the anchors. As is known in the art, a comparison of the anchors will reveal whether the prior synchronization was completed or not.
- An anchor may be a value which is used by one or both systems in a synchronization process to determine the state of synchronization of the systems. Typically, the fact that anchors match indicates that the last synchronization was successfully completed.
- a synchronization begins by the host requesting either the changes if it is a fast sync or all records if it is a full or complete sync. Then in operation 197, the device sends the changes, or all records depending on the type of synchronization, to the host.
- the host acknowledges in 199 the transmission transactions resulting from operation 197. These acknowledgements may be performed at one or more levels, including at a packet level or a record level, etc. A final acknowledgement from the host will cause the device, in operation 201, to save its next device anchor at the device.
- all "next" anchors such as a next device anchor which has been saved, will become a previous device anchor for use in a future synchronization.
- the sync agent maintains for each class the previous host anchor as well as the previous device anchor and will create the next device anchor for a particular data class during a synchronization operation.
- the sync client will maintain for each class a previous host anchor and a previous device anchor and may create the next host anchor for use in the processes shown in Figures 5 , 6A , 6B , 7A , and 7B .
- the device may acknowledge after operation 201 that it has saved its next device anchor in operation 201 which will cause the host in operation 203 to save the next device anchor at the host and to commit to a data store the changes or all records for the particular data class. This may occur by having the data class handler for a particular class request sync services 141, or in other examples, a file system software component, to make changes to the database or store for the structured data of the particular data class being synchronized. Then in operation 205, the device indicates that it is ready to pull. This indicates to the host that the device is ready to accept either changes or all records depending on the synchronization type which was negotiated.
- the host in operation 207 sends changes or all records, depending on the synchronization type, and the device acknowledges (operation 211) these data transmissions from operation 207 at one or more levels of granularity as indicated above. Then, in one example, in operation 211, the device sends a map which indicates the relationship between identifiers (ID) for each record maintained at the host relative to a corresponding ID maintained at the device for the same record; in an alternative example, the device may indicate the map information when it acknowledges the records received from the host computer rather than as a separate message in the protocol.
- ID identifiers
- the same identifier may be used, but at least in certain examples, it may be desirable to have a distinct and separate ID maintained by the device for each record which may be different than an ID maintained for that same record on the host.
- a map or a relationship between the corresponding IDs may be maintained.
- the map is created by the device and transmitted to the host.
- the host In response to receiving the record ID map, the host provisionally stores the map indicating the relationships between a device ID for a record and the host ID for the same record.
- the host transmits a commit request to the device in operation 213 which will cause the device to save either the changes or all records, depending on the synchronization type, from the current synchronization session to its data store for the current data class. Also, in operation 215, the device will save the next host anchor. Then in operation 217, the device responds with an acknowledgement signal which will cause the host in operation 219 to commit the pulled records and to save the next host anchor.
- the committing of pulled records also commits the provisionally stored map indicating the relationship between a device ID for a record and the host ID for the same record.
- the method shown in Figure 5 may be implemented differently in alternative examples; for example, certain operations may be omitted and the order of those operations may be different.
- the transmission of the version numbers may be omitted or the transmission of the ID map may be omitted.
- the order of operations may be altered such that the device pulls changes or all records from the host first before sending its changes or all records to the host.
- the connection may be initiated by the device rather than the host and the device may perform certain operations that the host performs in the method shown in Figure 5 .
- Figures 6A and 6B show a flow chart which illustrates one example of the operations performed by software components on a host, such as the sync client software component as well as a data class handler for a particular data class being synchronized in a synchronization session.
- the discussion of Figures 6A , 6B , 7A , and 7B will assume that the software architecture shown in Figure 4 is used in the particular example being described for these methods. It will be appreciated that alternative software architectures may also be used with these methods.
- Operation 251 of Figure 6A involves determining whether or not the device and the host have been connected by the device link set of software components, such as the device link 107. This connection determination may be performed by the sync client 111.
- operation 253 it is determined whether there are any further data classes that still require synchronization for a current synchronization session. If none are left, then the device and the host may be disconnected. Then in operation 255, it is determined whether the device can synchronize the particular data class. This is similar to the automatic checking of support for a particular data class that was described in connection with operation 185 of Figure 5 . If the device cannot synchronize a particular data class, then synchronization for that data class is canceled, reverting back to operation 253. Synchronization for a data class may not be supported if the device does not include a particular data source to support synchronization of the data class.
- synchronization for the data class might be refused by the device if the data source cannot obtain resources that it needs to synchronize that data class (e.g. as described herein, the application using the data in the data class may refuse to yield to requests to synchronize the data class).
- the sync client obtains the version number of the data source for the current data class being synchronized. This version number is compared to the version number of the data class handler on the host to determine whether they match or are otherwise compatible. This version checking has been described elsewhere and is further illustrated in Figures 8A and 8B .
- a user interface in operation 261 may be presented to the user to indicate the need or desirability to update or upgrade one or more software components in order to allow synchronization to be performed. If the versions match or are otherwise compatible, then in operation 263, the anchors and synchronization type are obtained from the device. This in at least one example results in operation 193 shown in Figure 5 . Then in operation 265, the synchronization operation is started, and in operation 267, the synchronization mode (e.g. one of complete, or changes only, or reset) is negotiated. If reset mode is negotiated in operation 267, then this is detected in operation 269 which causes processing to branch to operation 273 which tells the device to clear all records. If reset mode has not been selected, then the processing selects between either fast synchronization mode as determined in operation 271 or full/complete synchronization mode, resulting in operation 275.
- the synchronization mode e.g. one of complete, or changes only, or reset
- the host asks the device for changes in the current data set if the synchronization is a fast synchronization.
- the records are processed in operation 279 at the host and one or more acknowledgement may be sent to the device.
- the processing of the records in operation 279 may be performed by the data class handler for the current data class, and this processing may include "mutation" of records and other changes to put the structured data into the proper format for storage in the data store for the current data class.
- the host saves the next device anchor, and in operation 283 it asks sync services, such as the sync services component 141, to prepare to pull, which involves transmitting changes or all records to the device as the second part of synchronization from the host's side.
- the form of synchronization is determined in operation 285. If it is a fast synchronization, then operation 289 follows. In one example, if it is a slow (complete) synchronization (e.g. a reset synchronization), then operation 287 follows.
- One or more acknowledgments are received from the device; the host may also receive with these acknowledgments from the device a record ID map which shows the relationship between the device ID for a record and the corresponding host ID for that record. This ID map is saved at the host by the data class handler for the current data class. Then in operation 293, the host sends a message to the device asking whether it can commit to the changes.
- Figures 7A and 7B illustrate a method which may be performed by a device in at least certain examples to perform synchronization at the device.
- This synchronization may employ the software architecture shown in Figure 4 and may also follow the method shown in Figure 5 for the device portion of Figure 5 .
- the device waits for a connection which may be a wired connection or a wireless connection. Once it is connected in operation 303, it tells the host that the device is ready for synchronization. This operation 303 may be performed by the sync agent software component of Figure 4 . Then in operation 305, the device waits for a request to synchronize data in a particular data class or disconnect.
- Operation 307 represents one way in which the device supports automatic checking of support for a particular data class as described elsewhere in this disclosure. If a data source for the data class is found, then a negotiation of version occurs in operation 309. This negotiation of the version may occur between the data source on the device and the data class handler on the host as described elsewhere and as shown in Figures 8A and 8B . After the version has been negotiated in operation 309, the device obtains anchors from the host and based on those anchors, as described herein, determines the synchronization mode (e.g.
- Clear history refers to the change history managed, in at least one example, by the application on the device and the Data Source.
- an application e.g. Contacts or Calendar application
- the application notes these changes in a Change History which can be consulted by the Sync Agent's Data Source if it can do a "fast sync”.
- the Data Source gets the change history (list of changes since last synchronization) so it knows what records were changed (and can only send over the changed records instead of all records - in a "fast sync"), and after the synchronization (or when doing a reset or slow sync) it clears the change history (the list of changes), so the application can then start building a new list of changes for the next synchronization.
- Processing proceeds from operation 323 to operation 325 in which the device sends a message that it is ready to pull data from the host.
- the synchronization mode is determined in operation 327. If a slow/full synchronization is to be performed, then all records in operation 329 are received from the host.
- a fast synchronization is to be performed, then changes from the host are received for the current data class and the device sends back one or more acknowledgments to the host confirming receipt of the data.
- One or more acknowledgements may also be transmitted from the device to the host for the records received in operation 329.
- the device creates a remapping for added records and sends device identifiers for those records to the host. This remapping is typically performed by the data source for the current data class and is transmitted to the data class handler on the host for the current data class, which causes the saving of the mapping between host IDs for a particular record and device IDs for the same record.
- the sync client on the host asks the sync agent on the device whether the device can commit to the changes. If not, the data source causes a rollback to the prior version of the structured data by not saving the changes from the current synchronization session and, after operation 337, processing proceeds to the next data class, which in one example may mean that processing returns back to operation 305. If the device can commit to the changes, then operation 339 is performed in which the device saves the next host anchor and commits the transaction by saving the changes or all records to its store for the current data class and sends a message to the host that the device has committed.
- Figures 8A and 8B will now be referred to in connection with examples which utilize version identifiers for the data source and the data host handler in determining whether and how to synchronize for a particular data class the structured data on both the host and the device.
- the method of Figure 8A determines whether there is another data class that needs to be synchronized and identifies that data class.
- either the sync agent or the sync client may be responsible for selecting the order of synchronization among the various data classes. If there are no data classes left to synchronize, then the synchronization session is ended and the device and host are disconnected for purposes of synchronization in operation 405.
- processing proceeds to operation 407 in which the next data class begins synchronization by initializing the data class handler on the host for the selected data class and sends that data class handler version number for the current data class to the device.
- the data source on the device may send its version number to the host.
- the data source initializes itself on the device and compares its version number on the device to the data class handler version number on the host. Then in operation 411, based on the comparison of the version numbers, it is decided how and whether to synchronize and whether or not an alert needs to be presented to the user to update or upgrade one or more data source software components or data class handler components on the user's device and/or host.
- Figure 8A it is assumed that one system or the other system makes a decision in operation 411 based upon the set of version identifiers which is either on the device or the host but not both.
- Figure 8B represents an alternative implementation in which both systems have both version numbers and can perform the comparison and arrive at the same decision. If a decision was made to synchronize in operation 411, then in operation 413 the synchronizing is performed for the current data class, and Figures 5 , 6A , 6B , 7A , and 7B provide examples of how synchronization can be performed for a current data class.
- Figure 8A After synchronization is completed, other operations are performed, such as saving anchors for the current data class in operation 415, and the process of Figure 8A reverts back to operation 403 which has been described previously. It will be appreciated that alternative examples of Figure 8A may involve fewer operations or more operations and may alter the sequence of those operations in a manner which is different than that shown in Figure 8A .
- Figure 8B shows an example which utilizes version identifiers for each data source software component on a device and for each data class handler software component on the host.
- both the host and the device will receive both version numbers and perform the comparison and then decide how and whether to synchronize for the current data class.
- One or both of the sync agent and the sync client may perform this function in operation 427. If there are no further data classes to synchronize, then, in operation 429, synchronization is ended and the device and host may be disconnected under software control.
- the data class handler for the current data class on the host is initialized and it causes its version number to be sent to the device.
- a data source software component for the same current data class on the device is also initialized and its version number is sent to the host.
- the host and the device each compare the two version numbers and decide, based upon the higher version number, how and whether to synchronize for the current data class. If it is decided to not synchronize for the current data class, one or both systems may display or otherwise present an alert to the user suggesting the user to update and/or upgrade a software component or several software components on at least one of their device and the host.
- synchronization for the current data class will not occur and processing reverts back to operation 427.
- the higher version number software component decides that it is compatible with a lower version number software component on the other system, then synchronization can be performed. Also, if the version numbers match, then synchronization can also be performed.
- operation 435 synchronization is performed and then in operation 437 synchronization is completed by, for example, saving anchors and processing other data for the current data class and then processing reverts back to operation 427.
- the system (host or device) with the higher version may use the version information from the other system in order to take any action necessary to synchronize data to and from the system with the old version.
- the "old system” might use a different name for some properties, and the system with the higher version can know this and translate the name back and forth.
- the older system might represent some properties differently, and if they can be translated back and forth the system with the higher version can do that translation coming and going.
- a software layer for creating and maintaining a data connection for one or more services may be used for each of those services and may provide an interface to one or more stream handlers which implement transport protocols to send structured data, files and other data through a physical interface, such as a wired USB interface or a Bluetooth wireless interface or other wireless interfaces, such as a WiFi interface or a wireless cellular telephone interface.
- a physical interface such as a wired USB interface or a Bluetooth wireless interface or other wireless interfaces, such as a WiFi interface or a wireless cellular telephone interface.
- the same layer may also provide for encrypted authentication, and this authentication may be a two-way authentication which establishes an authenticated connection throughout the transmission back and forth between a device and a host through the device link connection layer.
- the software architecture shown in Figure 4 shows a device link 107 which may be implemented in the manner shown in Figure 10 which illustrates a software architecture in which layers of software interface with each other through messages or calls at the interface between the software layers.
- the software architecture 450 is shown as having four layers which include a device link connection layer 457, a stream handler layer 459, and stream libraries layer 465 as well as an upper layer for one or more applications or services, such as a backup application or service or a configuration application or service or synchronization services provided by the sync client software component and the sync agent software component described herein.
- the sync client and sync agent software components 454 provide the synchronization functions and operations described with respect to Figures 4-8B .
- the application software component 452 may be a backup application which backs up data, including data which has not been synchronized, or alternatively a configuration application or one or more other types of applications which need to make a connection in a secure and authenticated manner through the device link connection layer 457.
- the stream handler layer 459 includes one or more stream handlers. In the particular embodiment shown in Figure 10 , there is a USB stream handler 461 and a Bluetooth stream handler 462 and a TCP stream handler 463. These different stream handlers implement the communication protocols and handle the stream over the different interface represented by USB or Bluetooth or TCP (which may be a WiFi or other wireless interface which utilizes TCP/IP).
- the stream library layer 465 is called upon by the stream handler to transmit and receive data through the particular protocol represented by the stream handler.
- the USB stream handler may make calls to a particular group of stream libraries in order to transmit data over a USB interface.
- the Bluetooth stream handler 462 may make calls to one or more libraries in the libraries layer 465 in order to transmit and receive data through a wireless Bluetooth interface.
- the device link connection layer 457 provides a unified interface to all the stream handlers in the stream handlers layer 459 by making calls to the appropriate stream handler based upon the currently used physical interface to connect the device to the host.
- the device link connection layer 457 includes both connection functionality and authentication and/or encryption functionality represented by the sublayers 456 and 458, respectively.
- the sublayer 456 is responsible for selecting the particular physical interface and establishing a connection through the interface by authenticating, as described below, the host to the device and the device to the host, and at the same time by invoking a particular stream handler for the selected interface which in turn invokes the appropriate stream libraries to create packets or other data structures for transmission over the physical interface.
- the device link connection layer 457 may be responsive to either a user input to synchronize or back up or configure a device, or may be responsive to an automatic discovery of the device through a technology such as Bonjour from Apple Computer, Inc. For example, docking a device in a dock which is coupled to the host may cause Bonjour to recognize that a device has been docked to a host and that the user may desire to synchronize the device.
- This may cause a display of a user interface asking the user if the device should be synchronized, or alternatively, the device may be automatically synchronized as a result of placing it in the dock.
- This will then cause the sync agent and sync client to begin a synchronization process as described herein and to also make calls to the device link connection layer in order to transmit data between the host and the device.
- Calls made by the sync client or the sync agent in the process of synchronization result in the device link connection layer 457 making software based calls or sending other types of messages to the stream handlers layer 459, which in turn call particular libraries in the stream libraries layer 465.
- the synchronization software components such as the sync client and the sync agent components
- the device connection layer provides a uniform interface which authenticates the device to the host across three different physical interfaces and many different stream handlers; this isolates the synchronization software components as well as the other application components from the authentication software.
- a developer of a synchronization client or a synchronization agent or a data source for a data class or a data class handler for a data class do not need to recreate code (e.g.
- the software program to implement stream handlers or to implement authentication or encryption or to implement software to create the connection between a device and a host.
- all services which use the device connection layer such as the synchronization services or the application services 452 (e.g. backup applications, configure applications, diagnostic applications, etc.), obtain the benefit of automatic, two-way authentication, in at least certain embodiments, as a result of making calls to the device link connection layer 457 which in turn causes authentication and/or encryption to any one of the possible physical interfaces and their corresponding stream handlers.
- the use of the authentication and encryption layer 458 at a layer of abstraction between the transport and the protocol (stream handler) layers makes the architecture useable by more than just synchronization.
- DeviceLink 457 may handle all authentication and encryption automatically for the application (the application may merely have to indicate where to find the certificates used by the security code). Further, the DeviceLink connection authenticates both the device and the host. DeviceLink 457 may provide asynchronous behavior for all stream handlers (transports) doing I/O between the device and host, so the transport just has to read/write synchronously, and DeviceLink 457 manages the thread control to make it appear as asynchronous to the application, so the application never blocks reading and writing - the application (such as Sync Client on the host or Sync Agent on the device) is notified of incoming data (and other related things, such as connection/disconnection) via callbacks.
- DeviceLink 457 does all the authorization at the top of the stream (transport) layer, so all transport types which may be plugged in get authentication and encryption without needing to implement anything special.
- Device Link 457 may have file transfer facilities built directly into DeviceLink's protocol. This may be used for backup, and other tools (and can be used in future applications based on device link 457).
- the protocol of DeviceLink 457 may include a function to do efficient transfer of a file in pieces, so that a file does not have to be read completely in memory at one time.
- DeviceLink 457 may provide Unix style "stat" information (by itself, or with the file), such as the size of the file and the last modified date, so the applications can keep track of the file's state to tell if it needs to copy it or not (this may be useful for incremental backups).
- an application can use the protocol to request information about a file, and to request the file itself. The file is sent in chunks to avoid reading a huge file into memory all at once (on both sides).
- DeviceLink 457 may provide some default behavior when the file is requested to just get the file and send it (so the application doesn't need to respond to the callback for the request and take explicit action), although the application can respond if it wants to do custom handling (and use its own code if it wants).
- DeviceLink 457 may provide a "white list" of which files (or directories) can be requested, and which files or directories can be written into, so the two sides can control access.
- Other file copying solutions on the device may also exist independently of DeviceLink 457; for example, a media player (e.g. iTunes) may provide file copying facilities; however, DeviceLink 457 provides considerable infrastructure (authentication, asynchronous interface, part of the existing DeviceLink protocol for ease of use by an application), and has more functionality then a simple file copy API (it has the white lists, and default handling which can be overridden, and chunks the files).
- a synchronization initiator for example, either Sync Agent 109 on the device or Sync Client 111 on the host
- a synchronization initiator will be launched (e.g. by the user or by the system, such as by a Bonjour discovery process).
- the initiator will then try to connect to the other side.
- the initiator through DeviceLink connection layer 457, will establish a basic (unauthenticated) connection, which causes the launching of the other application (e.g.
- the DeviceLink connection layer 457 attempts to perform a two-way authentication process, described further herein; if that process succeeds, then an authenticated connection between the host and the device has been created and the synchronization initiator gets a callback from the DeviceLink connection layer 457 that the connection was made and the connectee application (that was launched by the basic connection) gets a notification that an incoming connection was made; for example, if authentication is successful and if Sync Client 111 was the initiator, then Sync Client 111 will receive the callback and Sync Agent 109 is the connectee application. If authentication fails, the initiator receives a connection failed callback and there is no connection, and the connectee will normally exit after some time interval.
- FIG 11 illustrates an alternative example of the operations of a device link connection layer 457.
- a connection is established. This may be performed by discovering the device. For example, Bonjour may be used to discover the device, either when connected through a wireless connection or a wired connection to the host.
- the device link connection layer may then decide which interface to use, and there may be a priority associated with each of those interfaces based upon speed, security, and convenience. For example, USB may be the highest priority connection interface followed by WiFi and finally Bluetooth, in at least certain embodiments.
- the device link connection layer performs authentication between the host and the device. In at least certain examples, this authentication is two-way, meaning that each of the device and the host perform authentication operations with certificates created upon initialization.
- Figure 12 shows an example of the collection of certificates that the device and host may have after initialization of both in a manner described herein.
- authentication may be optional.
- the device connection layer or other software may cause the launching of a sync client and sync agent in order to begin synchronization.
- the device link connection layer maintains the connection, which may be maintained as an authenticated connection, during the synchronization process of structured data in operation 507.
- the method of Figure 11 may be used with non-synchronization services, such as the backup application or configure application 452. In this case, the connection may be maintained, and it may be an authenticated connection during those services.
- the device link connection layer may disconnect the device from the host in software, even though the device may still be in the dock of the host.
- the software connection is torn down as a result of ending the synchronization process or other process which invoked the device link connection layer 457.
- Figure 12 shows an example of data structures maintained at both a device and a host after performing an initialization of an authentication system which provides two-way authentication between the device and the host.
- the authentication is encrypted with public key/private key cryptography, thereby providing a high level of security to allow a device to be synchronized to a host through a wireless interface while maintaining sufficient security so that the user can be assured that other hosts will not be able to obtain access to data on either the device being synchronized or the host.
- this two-way authentication may be used for file transfers between the device and the host and for other services (e.g. diagnostic services) which utilize the authenticated connection.
- the device may be required to be connected by a wired interface initially and the user may be asked, by the display of the device, to enter a value, such as a large number or other character string, into the host.
- a value such as a large number or other character string
- the device may create a private and public key pair and save its private key.
- the host may perform a similar operation to create a private key of the host and a corresponding public key of the host.
- the host may also create a certificate for a self-created certificate authority and may further create a public key/private key pair for the certificate authority.
- Each of the device and the host may include an identifier which may be a unique identifier for each system, and each of these identifiers may be transmitted to the other side (device ID transmitted to host and host ID transmitted to device) and this identifier is mapped to the saved private key of a particular system.
- the saved private key of the device 529 for its host is mapped to the host's ID which is provided by the host.
- the device's ID 535 for that device is mapped to the private key of the host 531.
- the host may create a certificate and sign it with a certificate authority using the host's public key, optionally with additional information.
- the host may also create a device certificate and sign it with the certificate authority certificate and then may transmit these certificates (537, 541, and 545) to the device.
- These certificates can be used in known techniques, such as a secure socket layer handshake, to provide transport layer security and to provide a two-way authentication between the device and the host. This authentication may be maintained during the entire connection, which may include a synchronization operation and other operations utilizing this authenticated connection.
- the device has a mapping between a host identifier and the following: Device private key used for that host, device certificate used for that host, host certificate, host certificate authority certificate (used in the self-signed authentication).
- the host has a mapping from a device ID to the following: Host private key used for the device, host certificate used for that device, device certificate, host certificate authority certificate used with that device.
- the device has a separate device private key for any host it communicates with (the private key maps to the device certificate used with that host, and the device has one device certificate per host), and there is a similar arrangement on the host side, as there is a separate private key host certificate pair per device.
- Figures 13A and 13B relate to an aspect of at least certain embodiments described herein. This aspect involves the ability for one or both of the device and the host to have both non-synchronization processes and synchronization processes occurring concurrently in that they are both being executed by one or more processing systems. Both sets of processes or threads may be in different address spaces. This allows a user of a device to operate the device while it is being synchronized, and similarly allows a user of the host to operate the host while the host is synchronizing with the device.
- a user on the device may be viewing a calendar program which displays a calendar of the user showing events and possibly To Do items for the user while at the same time a synchronization service is synchronizing the calendar data on the device with calendar data on the host.
- This synchronization may be implemented using the software architecture shown in Figure 4 and may further use the methods shown in Figures 5-7B .
- the user may use an application program on the host to access and edit the calendar data or other structured data for other applications while at the same time the host is performing synchronization operations on structured data in one or more stores of structured data.
- the synchronization process may be implemented on the host using the architecture shown in Figure 4 and using the methods shown in Figures 5-7B , which have been described above.
- the non-synchronization threads or processes may be user-level or non-user-level threads or processes which are not synchronization tasks.
- the synchronization threads or processes are synchronization tasks performed by one or more synchronization software components such as Sync Agent 109 or Sync Client 111 or other synchronization software components.
- the concurrent execution of the non-synchronization threads or processes and the synchronization threads or processes may occur on one or both of the device and the host.
- Operation 575 in Figure 13A shows that non-synchronization threads or processes may be performed on both the device and the host.
- execution of synchronization software begins on, in this embodiment, both the device and the host while execution of non-synchronization threads or processes continues on both the device and the host.
- a synchronization software component such as the Sync Agent 109 attempts to acquire a lock on a store for a data class which is to be synchronized.
- Sync Agent 109 in one embodiment may do this by invoking the Unix FLOCK call to lock the file containing, for example, the bookmarks to be synchronized.
- a synchronization software component accesses an SQlite database, if may not need to acquire a lock as the database may handle this function itself.
- Contacts, Calendars and Notes may be stored in databases which handle their own locking at a lower level.
- Sync Client may not attempt to acquire any locks.
- the synchronization component in operation 581, may notify the application using the data class that the synchronization component requests the lock and the synchronization component waits for a response.
- the application may receive a response indicating the lock is acquired, in which case processing proceeds to operation 591; otherwise, if the lock is not acquired after the notification, the processing proceeds to operation 583 in which synchronizing of the current data class is canceled and operation 579 follows if further data classes need to be synchronized (otherwise the process ends). If, while synchronizing is being performed, the user attempts to change the store for the data class being synchronized, the system (e.g.
- either the device or the host may present, in operation 593, an alert to the user that the system cannot accept changes until synchronizing is completed.
- operation 595 the lock is released and processing proceeds to the next data class, if one still remains to be synchronized, or synchronization is finished.
- only one of the host and the device may support concurrent operation of non-synchronization processes and synchronization processes.
- the bookmarks of various web browsers on each of the device and the host may be collected together and stored in an intermediate or canonical topology which is used to synchronize the bookmarks and collections of bookmarks on at least two web browsers, one being on the device and one being on the host.
- the intermediate topology collects the various bookmarks from the different web browsers, aggregates those into the canonical topology, and then uses that topology to synchronize the bookmark structures for each of the web browsers on such a system.
- the synchronizing may also include converting between one format (e.g. a URL data type to another format (e.g. a string representing the URL) for each of the one or more bookmarks in each web browser.
- the synchronization of bookmarks on different browsers may require a mechanism to convert or otherwise deal with the difference in the format of the hierarchy of bookmarks.
- different web browsers have different data structures for maintaining a hierarchy of a collection of bookmarks. Each of these data structures may be considered a topology.
- Figures 14A, 14B, 14C, and 14D provide examples of those different topologies.
- the example shown in Figure 14A may be the topology of the web browser known as Safari from Apple Computer, Inc.
- topology shown in Figure 14B may be the topology of Internet Explorer from Microsoft Corporation
- the topology shown in Figure 14C may be the topology of Firefox
- the topology shown in Figure 14D may be the topology of a web browser on a device, such as a handheld computer with wireless cellular telephone capabilities or other wireless interfaces, such as WiFi, which may be used to access the Internet and browse the Internet.
- the topologies shown in Figures 14A, 14B, 14C, and 14D represent the topology prior to synchronization among the web browsers.
- the topology 625 includes a bookmarks menu 627 and a bookmarks bar 629 as well as one or more folders 631 which may be arranged in a hierarchy including folders 632 and 633.
- the topology 637 in Figure 14B does not include a bookmarks menu but does include a bookmarks bar 638.
- Another difference between the topology 637 and the topology 625 is the existence of bookmarks at a top level in the topology, such as the bookmarks 639 and 640.
- the topology 625 there is no support for bookmarks at the top level; in other words, the bookmarks must be within a folder or in the bookmarks menu or in the bookmarks bar.
- the topology of 637 supports bookmarks at the top level, such as the bookmarks 639 and 640.
- the topology 637 also includes a collection of one or more folders which may be arranged in a hierarchy, such as folders 641 and folders 642 and 643.
- the topology 651 is similar to the topology 625 except that bookmarks at the top level, such as bookmarks 639 and 654, may be included in the topology 651 but they are not included or allowed in the topology 625.
- the topology 651 includes a bookmarks menu 652, a bookmarks bar 653, bookmarks at the top level, such as bookmarks 639 and 654, and a collection of folders containing bookmarks, such as folders 656 and 657 and 658.
- Figures 15A, 15B, 15C, and 15D show how the bookmark topologies appear after a synchronization between the collections of bookmarks for the different web browsers.
- the bookmarks menu 627A is the same as the bookmarks menu 627 except that it may include additional bookmarks as a result of the synchronization operation.
- synchronization has caused the addition of a top level folder 675 which may contain top level bookmarks from other topologies, such as the bookmarks 639 and 640 and 654.
- the synchronization process has added another folder to the structure 625A to accommodate bookmarks for top level bookmarks in other web browsers.
- the topology 637A has now included, after synchronization, a bookmarks menu 676 which incorporates the bookmarks found in the bookmarks menu 627 and 652 from the other two web browsers.
- the bookmarks data structure shown in Figure 15D has been modified to include a top level folder 677 in order to accommodate bookmarks at the top level from other web browsers.
- a synchronization process among multiple web browsers has resulted in the addition of bookmarks and folders and other data structures to the different topologies in order to synchronize the bookmarks among the different web browsers. This synchronization was able to occur even though the topologies for the bookmark structures of the different web browsers are different.
- the synchronizing which occurred is a form of synchronization which does not delete a bookmark in one web browser if it is not present in another.
- This synchronization may be implemented through an intermediate topology, such as a canonical topology.
- An example of such a topology is shown in Figure 16A along with a topology for a host's web browser bookmark structure and a device's web browser bookmark structure.
- a mapping relationship is also shown between the canonical topology and each of the other two topologies 637A and 665A.
- a mapping relationship is shown by a line with an arrow at each end. For example, bookmarks in the bookmark bar 638A are mapped to bookmarks in the bookmark bar 692 in the canonical topology.
- top level bookmarks 639 and 640 are mapped to the top level folder 693 in the canonical topology.
- folders and bookmarks within those folders 641A are mapped to folders 694 in the canonical topology 690.
- Bookmarks in the bookmark menu 691 of the canonical topology are mapped to other bookmarks 669A. This mapping relationship allows conversion during synchronization from one set of bookmarks on a device or a host to another set of bookmarks in another web browser on the device or the host.
- Figures 16B and 16C illustrate two methods for synchronizing bookmarks.
- Operation 701 of Figure 16B maps at least one bookmark from at least one web browser on a host to at least one of an intermediate topology or a device topology for bookmarks.
- the top level bookmarks 639 and 640 may be mapped to the intermediate topology 690 or directly mapped to the device topology 665A.
- at least one bookmark from at least one web browser on the device is mapped to at least one of an intermediate topology or the host's topology for bookmarks.
- An example of this mapping may be the mapping which occurs in bookmarks added to the top level folder in the topology 665A, which in turn are mapped to the top level bookmarks in the topology 637A.
- the mapping, in operation 701 and 703, may be implemented by a table or other data structure which shows the association between the different topologies such that synchronization may be performed in operation 705.
- bookmarks are synchronized on a device with bookmarks on the host.
- the device's bookmark topology may be different from the host's topology, and different than the intermediate topology as is shown in Figure 16A .
- the method of Figure 16C assumes that an intermediate topology is used and that there is a mapping between each of the web browsers and the intermediate topology. It will be understood that at least in certain examples, the host or the device may maintain a complete data structure of all bookmarks in the intermediate topology which can then be used to update the bookmark structure of each web browser.
- first bookmarks in a first topology for a first web browser on a host are mapped to an intermediate topology which may be maintained on the host or the device.
- second bookmarks in a second topology for a second web browser on the host are also mapped into the intermediate topology.
- the first bookmarks and the second bookmarks on the host are synchronized with third bookmarks on a device which is coupled to the host during the synchronizing period.
- two different web browsers having two different topologies on the host are synchronized with a web browser on the device.
- the device's topology for its web browser may be different than the first topology and different than the second topology and the intermediate topology.
- the system may perform this synchronization automatically without user interaction and without requesting any input from a user. While this may reduce the complexity required to configure such a system, it may be desirable to present one or more user interfaces which allow a user to set preference settings or other settings which indicate how the synchronization of bookmarks is to be performed among two or more web browsers.
- the user interface 725 shown in Figure 16D allows a user to select one option from three possible options by selecting one of the three check boxes 727, 729, and 731.
- the check mark shown in the check box 727 indicates that a user has selected the first option which synchronizes the device's bookmarks to the host's bookmarks and the host's bookmarks to the device's bookmarks; this is considered a two-way synchronization.
- the other two options are one-way only synchronizations. In particular, if the user had selected check box 729, then synchronization would be performed only to synchronize from the device's bookmarks to the host's bookmarks. If the user had selected check box 731, then synchronization would be performed from the host's bookmarks to the device's bookmarks only.
- Figure 16E illustrates another user interface which allows a user to select all web browsers for synchronization or only selected ones of the web browsers. If the user selects the check box 737, then synchronization is performed for all web browsers on both the device and the host.
- the interface 735 shows that the user has selected the second option by selecting the check box 739.
- the system will synchronize bookmarks with bookmarks of selected web browsers on the host, and the user has selected buttons 742 and 743 but has not selected buttons 741 and 744.
- bookmarks maintained by Firefox and bookmarks maintained by Safari on the host will be synchronized with bookmarks on the device as a result of these selections in the user interface 735.
- the selection of the button 744 will cause an application browser window to appear to display applications on the host to allow the user to pick selected applications from the list to include in the set of web browsers to be synchronized on the host.
- the user interface 750 shown in Figure 16F allows the user to limit synchronization to selected folders. This option has not been selected as can be seen by the absence of a check mark in the check box 751. If the user does select check box 751, then one or more browser windows may be caused to appear to allow a user to browse through windows containing lists of various bookmarks and bookmark folders, and bookmark bars on a system. It will be appreciated that each of these user interfaces may be used individually or in combination to allow a user to control how bookmarks are synchronized in at least certain examples described herein.
- Figure 17 relates to another aspect of at least certain examples described herein.
- This aspect relates to the synchronization of setup information for one or more electronic message system accounts, such as an email account or an instant messaging account.
- This synchronization may be performed in a one-way direction from the host to the device rather than in both directions.
- modifications made to an account setup information on the host may not be reflected on a previously set up account which has been established and is existing on the device.
- FIG. 17 provides one example of how account information may be synchronized.
- Figure 18 shows a memory structure of the device and a memory structure of the host with respect to email account setup information.
- the method of Figure 17 may begin in operation 781 in which a data processing system receives setup information for an email account (or for other types of electronic message systems). This information is received on the device and may be for an account "A.”
- the setup information 791 may be an example, in Figure 18 , of such setup information.
- the host may receive information to set up an email account which may be account "B" and is shown as setup information 795 in Figure 18 . Synchronization may occur after establishing a connection between the device and the host as in operation 785.
- account B which was established on the host, may be synchronized as a new account on the device.
- the synchronization may be a one-way synchronization in at least one example; this is represented by the arrow 790 shown in Figure 18 .
- the email account which was set up on the device is not synchronized back to the host.
- the device ends up having a superset of the email accounts. This may be desirable in cases where the user prefers greater privacy on the device than the host, for example.
- the direction of synchronization may be reversed such that it is from the device to the host and not from the host to the device. In this case, any account set up on the device will be synchronized and established on the host, but not vice versa.
- Figures 19 , 20 , and 21 relate to another aspect of at least certain examples described herein.
- This aspect relates to how notes may be synchronized.
- a note which is typically a text freeform document, may contain other information, such as image data, audio data, movie data, and even To Do items.
- the To Do items may be embedded within the note and may be created as part of creating the note.
- the To Do item is also synchronized in a separate To Do database in at least certain examples. Further information in connection with notes having embedded To Do items may be found in co-pending U.S. Patent Application No. 11/499,009, filed on August 4, 2006 , and entitled "Methods and Systems for Managing To Do Items or Notes or Electronic Messages;" this application is hereby incorporated herein by reference.
- Figure 19 shows one exemplary method for synchronizing a note which contains one or more embedded To Do's on either a host or a device.
- the note itself may be treated as one data class, while the To Do item will be treated as, in at least certain examples, another data class. If the architecture of Figure 4 is utilized, then a portion of the note is synchronized for the data source and the data class handler for the note store while another portion of the note is synchronized with another data store and another data class handler for the To Do data class.
- the note with an embedded To Do may be synchronized to merely one database or store rather than two through the use of only one pair of a data store and a data class handler.
- the note with an embedded To Do is stored on a host or a device. This will cause the updating of a To Do database on the host (or the device) in operation 813.
- the note database on the device is synchronized and the To Do database on the device is also synchronized. If the note was stored on the device in operation 811, then the note database on the host is synchronized and the To Do database on the host is synchronized in operation 815. In this manner, different parts of the note are synchronized to two different data stores.
- Figure 20 provides an example of how an embedded note may be created.
- a system such as a device or a host, receives content of the note.
- This content may be a freeform text document but may also include image data, such as a picture or other graphics.
- the system receives a selection of a command to create a To Do item from at least a portion of the content of the note. This selection may occur, in certain examples, before receiving the content.
- a To Do item is added to a To Do database. This new To Do item may optionally be presented to the user in a To Do window or other user interface item.
- Figure 21 shows an example of how a note or other type of structured data may be synchronized or not depending on a filter.
- the filter may be the size of the note to prevent the systems from attempting to synchronize a very large note which contains either a lot of text or image data.
- a connection is established to synchronize notes on a device to notes on a host.
- operation 845 is also performed for each note which is to be synchronized between the host and the device. This operation involves determining whether or not the note satisfies the filter.
- the filter may be a maximum size of the note. If the note exceeds the maximum size, then it will not be synchronized or only text portions will be synchronized. This is shown in operation 849. If the note does satisfy the filter, then it is synchronized as shown in operation 847. This is repeated for each note which is to be synchronized.
- a method may synchronize text and/or other small portions of such larger notes and include an indicator or marker in the synchronized copy (which has been reduced in size by the removal of the image or other data) that a portion of the original note (e.g. the image data portion) has not been included in the synchronized copy. In this way, synchronization of at least a portion of larger notes can still be performed while filtering out, in the synchronization process itself, the larger parts of the note.
- transformations of data as part of the synchronization process between the host and the device.
- these transformations include: converting data types such as a URL to a text string (e.g., in synchronizing bookmarks) or converting date formats for calendar events or converting contact images, etc.
- the device and the host may use a different format; for example, the device may use a first date format for calendar events and the host may use a second date format for calendar events.
- the Data Class Handler for a data class on the host may perform the transformations for that data class for both the host and the device as noted in Table D.
- the Data Source on the device for a data class and the Data Class Handler on the host for that data class may share the tasks of transforming between formats for that data class.
- the device may support contact images (e.g. for a contacts or address book application on the device) having a richer (e.g. more varied) format than contact images (for contacts or address book application on the host) on the host. Further, the device may store previously clipped versions of an image and previously scaled versions of images for a contact so it can display them quickly.
- the original image which was used to create a contact image may be maintained in its entirety.
- a user can pick images from a photo or camera application and apply them as a contact's image - these can be any size, so the user may choose the visible area of the image to use, and that visible area is, if necessary, scaled (e.g. scaled down) so it fits on the screen.
- the device may store a clip rectangle which the user chooses (though some user interface) to choose the portion of that image to be displayed.
- the device may also store clipped and scaled images for a rectangular-sized and square-sized image.
- the rectangular image may be the size of the screen, and may be shown on an incoming call.
- the square image may be shown scaled down even smaller as part of the contact, and used in situations where there is only some of the screen (a square area) which is available to display the image.
- the user interface shows how the rectangular and square images will look. If the user wants to regenerate what the device displays, the user will, in this example, still have the original image, so the user can go back to the original image and choose another clip rectangle, and regenerate the saved images in rectangular and square sizes and shapes.
- Synchronization of contacts/address book includes synchronizing the images in the contacts/address book and this includes synchronizing the clip rectangle as well as the original image.
- the synchronizing process may also have to regenerate the optimized images in certain cases, such as if the user changes the image in their Address Book on the host, or if the user gets an image from a device and synchronizes it to another device (e.g., the user gets an image from a device with one sized screen and wants to synchronize it to a device with a differently sized screen).
- the Data Class Handler may, in one example, clip/scale new/changed images when synchronizing them onto the device because that may be faster than having the device do it (and the device may also be memory constrained.
- the Data Class Handler in one example manages keeping track of the different rectangles (since each device will only know about the one rectangle that matches its screen size). For example, if a device has 320x480 screen, and a contact image is originally 1024x800, the synchronization process stores optimized images for the entire screen (320x480) and a square 320x320 representation as well.
- the user can pick the clip rectangle out of the original image which is then scaled down to 320x480 (and the device cuts out a 320x320 part), and this is synchronized to the host. If the image changes on the host, the synchronization process (through the Data Class Handler, for example) recomputes the 320x480 and 320x320 images for the device. If a new image is synchronized to a device with a different size, if the original image is still large enough to cover the screen, the synchronization process, in one example, will find the center of the image in the clip area for one of the existing clip rectangles (for the other size device screen), and expand/contract the clip rectangle accordingly to fit the different size (e.g. larger size) screen. If the new device has a smaller screen, the synchronizing process may merely scale the image down to that size.
- widgets are user interface elements that include information and one or more tools that let the user perform tasks and/or provide access to information.
- Widgets can perform a variety of tasks, including, for example, communicating with a remote server or other source of data to provide information to a user (e.g., weather report; stock prices; sunrise/sunset times; current phase of the moon; current exchange rates; etc.), providing commonly needed functionality (e.g., a calculator; a calendar; a clock; etc.), or acting as an information repository (e.g., a notebook).
- Widgets can be displayed and accessed through an environment referred to as a "unified interest layer,” “dashboard layer,” “dashboard environment,” or “dashboard.” Widgets and dashboards are described in co-pending U.S. Patent Application No. 10/877,968 , entitled “Unified Interest Layer for User Interface,” filed on June 25, 2004, which patent application is incorporated herein by reference in its entirety.
- Widgets on a device may be synchronized, using any one of the examples described herein, with widgets on a host or another device.
- the synchronization may be one-way (from device to host or another device only or from host or another device to device only) or two-way.
- both systems will normally end up with a common set of widgets, assuming both systems can support the full, common set of widgets.
- Widgets may be treated, at least in certain examples, as another data class and may be synchronized using the architecture shown in Figure 4 and described throughout this disclosure.
- a Data Source for widgets may exist on a device and a Data Class Handler for widgets may exist on a host.
- the executable software which implements the widget may not be synchronized but the configuration settings for the widget may be synchronized between a device and a host or between a device and another device.
- Each widget on a system may have configuration settings and these settings may be stored as one file for a particular type of widget.
- a weather widget may have settings which specify three cities (e.g. San Francisco, Los Angeles, and Washington, D.C.) and those settings are stored as one file or record for purposes of synchronization.
Description
- The various examples and embodiments described herein relate to systems and methods for synchronizing data between two or more data processing systems such as a desktop computer system and a handheld computer system. The invention particularly relates to a machine implemented method for synchronization between a device and a host, wherein the device and the host are physically separated and a link software component maintains an authenticated connection link between the device and the host, thereby allowing passing of commands and data between the device and the host during the synchronization process. The invention also relates to a computer readable storage medium containing executable program instructions, and a device.
- Modern data processing systems, such as a general purpose computer, a handheld computer, a cellular telephone, media players, etc. have been reduced in size to the point that they can often be readily carried around by a user. Furthermore, these devices are powerful enough that they can provide substantial computing power to allow a user to maintain contact information, maintain calendar information, provide email functionality, and even provide web browsing. These devices also may include support for a task or a To Do list or database and other sources of data for a user. An example of a small handheld computer is the Palm Treo, and other examples of handheld computers include those which run a Windows CE operating system.
- These handheld computers typically allow a user to synchronize their data between the handheld computer and another computer, such as a user's desktop computer, such that both computers maintain the same set of information, such as the same calendar for the user, thereby allowing the user to view their calendar on either the desktop computer or the handheld computer. The synchronization is typically performed by coupling together the host computer with a handheld computer through a mechanical and electrical connection provided by a dock.
Figure 1 shows an example in the prior art of a handheld computer being coupled mechanically and electrically to a host computer through thedock 26. Thesystem 10 includes thehost computer 12 and thehandheld computer 14.Synchronization software 16, running on the host, performs the synchronization between the respective databases, such as thecontacts database 18 which is synchronized with thehandheld contacts database 20. Furthermore, thesynchronization software 16 synchronizes thecalendar database 22 on the host computer with the handheld'scalendar database 24.Synchronization software 16 on the host computer can synchronize each of the databases separately through the use of "conduits." Thesynchronization software 16 opens and maintains a data connection link through a conduit, and each conduit must implement all the software needed to make and maintain the link in order to synchronize a particular database. The handheld computer merely acts as a storage device by vending its storage memory, such as a hard drive or a flash memory, to the host computer which, through thesynchronization software 16, opens each database to perform the synchronization. There is often no active agent on thehandheld computer 14 which participates in the synchronization process; in other words, thesynchronization software 16 on thehost computer 12 performs the synchronization operations for both sets of databases on both devices. When there is a synchronization agent on the handheld computer, it does not have the facilities and architecture described in this disclosure, including, for example, providing a plug-in model on both the handheld and the host for different data classes, and does not allow applications on the handheld computer to run concurrently with the synchronization process, and various other features described herein. There is no use of authentication and encryption using self-signed certificates with private key/public key cryptography. Certain existing systems allow for limited synchronization of emails between a host and a handheld computer, but there is no synchronization of changes in email account setup information. Certain systems also allow for the synchronization of bookmarks for web browsing between a host and a handheld computer. These systems allow for the synchronization of a set of bookmarks having the same format in both the handheld and the host. Certain synchronization systems are described under the name "SyncML" and further information about these systems can be found at www.openmobilealliance.org and at www.openmobilealliance.org/tech/affiliates/syncml/syncmlindex.html. - From "SyncML Representation Protocol, version 1.0", SYNCML REPRESENTATION PROTOCOL, XX, XX, 7 December 2000 (2000-12-07), pages 1-104, XP002217062 it is known that SyncML is a specification for a common data synchronization framework and XML-based format, or representation protocol, for synchronizing data on network devices. SyncML is designated fro use between mobile devices that are intermittently connected to the network and network services that are continuously available on the network. SyncML can also be used for peer-to-peer data synchronization. SyncML is specifically designed to handle the case where the network services and the mobile devices store the data they are synchronizing in different formats or use different software systems.
- "SyncML Sync Protocol, , further defines a synchronization protocol between a SyncML client and servber in form of message sequence charts.
- "SyncML Device Information DTD", 7 December 2000 (2000-12-07), XP002665278, URL:http://xml.coverpages.org/symbol/synccml_devinf_v10_2001207.pdf [retreived on 2011-12-08] defines the Document Type Definition (DTD) for the XML representation of the Device Information document. The document describes the capabilities of the device and is used in SyncML data synchronization protocol operations.
- Wikipedia : "Modul (Software), 20 October 2006 (2006-10-30), URL: http://de.wikipedia.org/w/index.php?title=Module_(Software)&oldid=23206899 [retrieved on 2014-05-09] gives some background information about software modules being self-contained parts of a software program consisting of a sequence of instructions and data structures.
- Olaf Zwitscher: "Software-Komponenten im Uberblick", 2005, W2L-Verlag, Nochum, ISBN: 3-937137-60-2, pages 20-26, notes in chapter 2.2 about the term software component that there are various definitions of different scope. One problem to be solved by software components is to compose software of smaller, independent and exchangeable modules so that in case of an error or in case the component is out-dated to replace just this module.
-
US 6 460 01 B1 describes a system and a method for synchronizing information in datasets via a communication medium that is susceptible to high latency, non-FIFO delivery order, or other adverse characteristics. According to an aspect of this US patent the disclosed synchronization method relates to a first data set with at least a second data set including a step of storing information that is indicative of a first version of user data and a second version of user data. -
US 6 324 544 B1 discloses first and second devices each containing an object store which stores objects indicative of file data, Synchronization components are provided to synchronize the objects while efficiently overcoming problems associated with synchronizing files. - This description relates to systems, methods and computer readable media which allow for synchronization tasks and non-synchronization tasks to be executed concurrently.
- The problem that both of the device and the host are able to have both non-synchronization processes and synchronization processes occurring concurrently is solved by synchronization method steps of claim1. A computer readable storage medium contain executable program instructions when executed is claimed by independent claim 5. A data processing system is claimed by independent claim 9. Dependent claims refer to further aspects and embodiments of the invention.
- In one embodiment, a method includes executing at least one non-synchronization processing thread, such as at least one user-level non-synchronization processing thread, and executing at least one synchronization processing thread concurrently with the executing of the at least one non-synchronization processing thread. The execution of at least one non-synchronization processing thread may include operations to access a first database which is synchronized by the at least one synchronization processing thread during a synchronization operation between the first database on a first data processing system and a second database on a second data processing system.
- In at least certain embodiments, a method as described herein allows a user to operate both a host and a device while the two systems are performing synchronization operations. Hence, for example, a user may manipulate or view a calendar while a synchronization operation, which synchronizes structured data from, for example, the calendar or other databases such as a contact database, is being performed.
- In at least certain embodiments, the at least one synchronization processing thread may be provided by a synchronization software component which is configured to cause retrieval and storage of structured data from a first store and wherein the at least one user-level non-synchronization processing thread is provided by a user application which provides a user interface to allow a user to access and edit the structured data in the first store. These different threads may be in different address spaces. In at least certain embodiments, the synchronization software component acquires a lock on the first store in order to prevent the user application from affecting the first store while a synchronization process is occurring. In at least certain embodiments, the synchronization software component attempts to acquire the lock, and if it fails to do so, the synchronization software component sends a message to the user application to obtain the lock on the first store. The lock, in certain embodiments, may be the FLOCK Unix command. The synchronization software component may cancel synchronization for at least one data class if the user application fails to release the lock on the first store after a period of time subsequent to sending of the message.
- The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
-
Figure 1 shows in block diagram form an example of a prior art synchronization system. -
Figure 2 shows an example of a data processing system, such as a host computer. -
Figure 3 shows an example of a data processing system, such as a handheld computer or other type of data processing system. -
Figure 4 shows an example of a software architecture for implementing synchronization between, for example, a device and a host. -
Figure 5 is a flow chart showing events in time between a device and a host according to one example of a synchronization process. -
Figures 6A and6B are flow charts which illustrate a synchronization process on, for example, a host. -
Figures 7A and7B are flow charts illustrating a synchronization process on, for example, a device. -
Figures 8A and8B are flow charts illustrating the use of version identifiers according to at least certain examples of the inventions. -
Figures 9A and 9B illustrate two examples of data formats for two different types of data classes; in particular,Figure 9A shows a data format for a contacts data class which contains structured data, andFigure 9B shows a data format for a calendar data class. -
Figure 10 shows an example of a software architecture having multiple layers as described herein. -
Figure 11 is a flow chart illustrating an embodiment of a method which may be performed with the software architecture shown inFigure 10 . -
Figure 12 illustrates the result of a two-way authentication process which may be used in at least certain embodiments described herein. -
Figures 13A and13B are flowcharts which illustrate one method in which synchronization and non-synchronization operations may be performed concurrently by one or both of a host and a device during a synchronization process. -
Figures 14A, 14B, 14C, and 14D illustrate various possible formats for bookmarks for different types of web browsers. -
Figures 15A, 15B, 15C, and 15D illustrate a modified bookmark structure which occurs after synchronization through, in at least one example, an intermediate or canonical format for a bookmark data structure. -
Figure 16A shows an example of mapping relationships between a web browser on a host and a web browser on a device, wherein this mapping relationship also shows the mapping between the data structure of the bookmarks on the host and the device relative to an intermediate format. -
Figure 16B is a flow chart illustrating a method according to one example described herein. -
Figure 16C is a flow chart illustrating another example relating to the synchronization of bookmarks. -
Figures 16D, 16E, and 16F provide examples of user interfaces for allowing preference settings with respect to the synchronization of bookmarks between two data processing systems, such as between a device and a host. -
Figure 17 is a flow chart illustrating a method for synchronization of email account or other electronic message account setup information. -
Figure 18 shows a memory of a device and a memory of a host which store email account setup information as shown in the figure. -
Figure 19 is a flow chart which illustrates one method for synchronizing notes which may include embedded To Do's in at least certain examples described herein. -
Figure 20 is a flow chart illustrating an example of a method for creating a To Do within a note to create an embedded To Do. -
Figure 21 shows an example of a method for using a filter to decide whether or not a note is to be synchronized. - Various embodiments and aspects of the inventions will be described with reference to details discussed below, and the accompanying drawings will illustrate the various embodiments. The following description and drawings are illustrative of the invention and are not to be construed as limiting the invention. Numerous specific details are described to provide a through understanding of various embodiments of the present invention. However, in certain instances, well-known or conventional details are not described in order to provide a concise discussion of embodiments of the present inventions.
- The present invention can relate to an apparatus for performing one or more of the operations described herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a machine (e.g. computer) readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), erasable programmable ROMs (EPROMs), electrically erasable programmable ROMs (EEPROMs), magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a bus.
- A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable medium includes read only memory ("ROM"); random access memory ("RAM"); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
- Prior to describing the various different embodiments in connection with synchronization architectures, systems, methods and computer readable media, a brief discussion will be provided in connection with the data processing systems which may be part of the synchronization process. The term "host" and the term "device" are intended to refer generally to data processing systems rather than specifically to a particular form factor for the host versus a form factor for the device.
Figures 2 and3 show examples of two different data processing systems, where the system shown inFigure 2 may be referred to as a host while the system shown inFigure 3 may be referred to as a device, although the system shown inFigure 2 may be referred to as a device while the system shown inFigure 3 may be referred to as a host. -
Figure 2 shows one example of a computer system which is a form of a data processing system. Note that whileFigure 2 illustrates various components of a computer system, it is not intended to represent any particular architecture or manner of interconnecting the components as such details are not germane to the present inventions. It will also be appreciated that personal digital assistants (PDAs), cellular telephones, media players (e.g. an iPod), devices which combine aspects or functions of these devices (a media player combined with a PDA and a cellular telephone in one device), network computers, an embedded processing device within another device, and other data processing systems which have fewer components or perhaps more components may also be used to implement one or more embodiments of the present inventions and may be one or more of the data processing systems described herein. The computer system shown inFigure 2 may, for example, be a Macintosh computer from Apple Computer, Inc. or a computer which runs the Windows operating software from Microsoft Corporation. - As shown in
Figure 2 , thecomputer system 45 includes abus 51 which is coupled to one or more microprocessors which form aprocessing system 47. Thebus 51 is also coupled tomemory 49 and to anon-volatile memory 50, which may be a magnetic hard drive in certain embodiments, or flash memory in other embodiments. The bus is also coupled to a display controller anddisplay 52 and one or more input/output (I/O)devices 53. Further, the bus is coupled to anoptional dock 54 and to one ormore wireless transceivers 55, which may be a Bluetooth transceiver or a WiFi transceiver or an infrared transceiver. It will be appreciated that thewireless transceivers 55 are optional as shown inFigure 2 . Theprocessing system 47 may optionally be coupled tooptional cache 48. Theprocessing system 47 may include one or more microprocessors, such as a microprocessor from Intel or IBM. Thebus 51 interconnects these various components together in a manner which is known in the art. Typically, the input/output devices 53 are coupled to the system through input/output controllers. Thememory 49 may be implemented as dynamic RAM (DRAM) which provides fast access to data but requires power continually in order to refresh or maintain the data in the memory. Thenon-volatile memory 50 may be a magnetic hard drive or other non-volatile memory which retains data even after power is removed from the system. WhileFigure 2 shows that thenon-volatile memory 50 is a local device coupled directly to the rest of the components in the data processing system, it will be appreciated that other embodiments may utilize a non-volatile memory which is remote from a system, such as a network storage device, which is coupled to the data processing system through a network interface, such as a modem or an Ethernet interface. Thebus 51, as is well known in the art, may include one or more buses connected to each other through various bridges, controllers, and/or adapters as is known in the art. In one embodiment, the I/O controller 53 may include a USB adapter for controlling USB peripherals and an IEEE-1394 controller for IEEE-1394 compliant peripherals. - It will be apparent from this description that aspects of the inventions may be embodied, at least in part, in software. That is, the techniques may be carried out in a computer system or other data processing system in response to its processor or processing system executing sequences of instructions contained in a memory, such as
memory 49 ornon-volatile memory 50 or thememory 63 shown inFigure 3 . In various embodiments, hardwired circuitry may be used in combination with the software instructions to implement the present inventions. Thus, the techniques are not limited to any specific combination of hardware circuitry and software nor to any particular source for the instructions executed by the data processing system. In addition, throughout this description, various functions and operations are described as being performed by or caused by software code to simplify description. However, those skilled in the art will recognize that what is meant by such expressions is that the functions result from execution of the code by a processing system. - The
dock 54 and/or thewireless transceivers 55 provide a physical interface for coupling the data processing system shown inFigure 2 to another data processing system, such as the data processing system shown inFigure 3 , or to another data processing system which resembles the system shown inFigure 2 . Thedock 54 may be similar to a dock in the prior art, such as thedock 26, such that it provides both a mechanical and electrical connection between one data processing system and another data processing system to allow a synchronization process to be performed between the two systems. In other embodiments, thewireless transceivers 55 may provide an electrical connection between the two systems for the purpose of a synchronization process without providing a mechanical connection between the two systems. -
Figure 3 shows an example of another data processing system which may synchronize data with other data processing systems, such as the system shown inFigure 2 or a system which is similar to that shown inFigure 3 . Thedata processing system 60 shown inFigure 3 includes a processing system, which may be one or more microprocessors, or which may be a system on a chip integrated circuit, and the system also includesmemory 63 for storing data and programs for execution by the processing system. Thesystem 60 also includes an audio input/output subsystem 64 which may include a microphone and a speaker for, for example, playing back music or providing telephone functionality through the speaker and microphone. A display controller anddisplay device 65 provide a visual user interface for the user; this digital interface may include a graphical user interface which is similar to that shown on a Macintosh computer when running OS X operating system software. Thesystem 60 also includes one or more wireless transceivers, such as a WiFi transceiver, an infrared transceiver, a Bluetooth transceiver, and/or a wireless cellular telephony transceiver. It will be appreciated that additional components, not shown, may also be part of thesystem 60 in certain embodiments, and in certain embodiments fewer components than shown inFigure 3 may also be used in a data processing system. Thedata processing system 60 also includes one ormore input devices 66 which are provided to allow a user to provide input to the system. These input devices may be a keypad or a keyboard or a touch panel or a multi-touch panel. Thedata processing system 60 also includes an optional input/output device 67 which may be a connector for a dock, such as thedock 54 shown inFigure 2 . It will be appreciated that one or more buses, not shown, may be used to interconnect the various components as is well known in the art. The data processing system shown inFigure 3 may be a handheld computer or a personal digital assistant (PDA), or a cellular telephone with PDA-like functionality, or a handheld computer which includes a cellular telephone, or a media player, such as an iPod, or devices which combine aspects or functions of these devices, such as a media player combined with a PDA and a cellular telephone in one device. In other embodiments, thedata processing system 60 may be a network computer or an embedded processing device within another device, or other types of data processing systems which have fewer components or perhaps more components than that shown inFigure 3 . - At least certain embodiments of the inventions may be part of a digital media player, such as a portable music and/or video media player, which may include a media processing system to present the media, a storage device to store the media and may further include a radio frequency (RF) transceiver (e.g., an RF transceiver for a cellular telephone) coupled with an antenna system and the media processing system. In certain embodiments, media stored on a remote storage device may be transmitted to the media player through the RF transceiver. The media may be, for example, one or more of music or other audio, still pictures, or motion pictures.
- The portable media player may include a media selection device, such as a click wheel input device on an iPod® or iPod Nano® media player from Apple Computer, Inc. of Cupertino, CA, a touch screen input device, pushbutton device, movable pointing input device or other input device. The media selection device may be used to select the media stored on the storage device and/or the remote storage device. The portable media player may, in at least certain embodiments, include a display device which is coupled to the media processing system to display titles or other indicators of media being selected through the input device and being presented, either through a speaker or earphone(s), or on the display device, or on both display device and a speaker or earphone(s). Examples of a portable media player are described in published
U.S. patent application numbers 2003/0095096 and2004/0224638 , both of which are incorporated herein by reference. - In certain embodiments, the
data processing system 60 may be implemented in a small form factor which resembles a handheld computer having a tablet-like input device which may be a multi-touch input panel device which is integrated with a liquid crystal display. Examples of such devices are provided inU.S. Patent Application No. 11/586,862, filed October 24, 2006 - In the following description, various software components which are used for both synchronization and non-synchronization processing operations are described. It will be understood that in at least certain embodiments, these various software components may be stored in the
memory 49 and/ormemory 50 shown inFigure 2 for one type of data processing system, and in the case of a system such as that shown inFigure 3 , these various different software components may be stored in thememory 63 which may include volatile memory as well as non-volatile memory, such as flash memory or a magnetic hard drive. -
Figure 4 shows an example of an embodiment of a particular software architecture for a synchronization system between one or more data processing systems, such as a device, which may be a handheld computer, and a host, which may be a desktop or a laptop computer. This software architecture may be used to implement one or more of the various embodiments described herein, such as the methods shown inFigures 5 ,6A ,6B ,7A , and7B , andFigures 8A and8B . This synchronization system may be used to synchronize structured data, such as data in a contacts or address database. Different data typically have different structures or formats which specify how the data is organized and formatted. These are referred to as data classes, andFigures 9A and 9B provide examples of two different structured data formats for two different data classes. In particular,Figure 9A shows a data format for a contacts data class, andFigure 9B shows a format for a calendar data class format. The synchronization system shown inFigure 4 may be used to synchronize calendar data between two different calendar stores on the two different systems and to also synchronize contact data between the two contact stores on the two systems as will be described further below. - The software architecture shown in
Figure 4 includes a plurality of software components on thedevice side 101 and a plurality of software components on thehost side 103. There is, in addition,device link software 107 which in effect bridges the connection between the two software components which are separated by theline 105 which represents the physical separation between the device and the host. It will be appreciated that the software components on each side are stored in respective memory on each data processing system. The device includes one or more user application programs which are used to access and edit structured data in a particular data class.Figure 4 shows examples of three such user application programs. In particular,calendar application program 125 is used to access and edit calendar data in thecalendar store database 119. Similarly, the contacts application program is used by a user to access and edit contacts or address book information stored in thecontacts store database 121. Similarly, theother application programs 129, which may include a notes application program, widget programs for presenting widgets, a web browser having bookmarks, an email program which includes email account setup information, a To Do list program, and possibly other programs which have structured data, are represented by theother application programs 129 which have access to and provide the ability to edit information in other storeddatabases 123. These user application programs, such asapplication programs Figure 4 asdata sources calendar data source 113 is responsible for causing the retrieval and storage of the structured data from its particular data class, which is the calendar data class, during a synchronization process. Similarly, thecontacts data source 115 is responsible for causing the retrieval and storage of structured data in the contacts storeddatabase 121, which may represent the user's address book or other contact information database. Similarly, other data sources, such asother data sources 117, are responsible for causing the retrieval and storage of structured data from other structured data stores. This may include databases for notes, emails, bookmarks, and/or To Do lists and other databases or stores of data. The data sources may also perform other functions, such as formatting the data either for storage on the device or for transmission to the host, transmitting and/or receiving version identifiers with respect to each data source relative to each data class handler for a particular data class, sending device and host anchors as described herein in order to ensure that synchronization operations are performed as atomic transactions to ensure that the synchronization is either completed or not, allowing the system to roll back to a prior state if it is not completed (in order to ensure that synchronization can be performed even if the connection is interrupted). Further, the data sources may also remap unique identification values for records on the device to records on the host so that the device can maintain a unique record regardless of a record ID (identifier) provided by a host. Each data source is coupled through software based messages to a syncagent software component 109 which is responsible for, at least in part, maintaining a data connection between the device and the host through a devicelink software stack 107, an example of which is shown inFigure 10 and described herein. Thesync agent 109 provides services, through software based messages, such as calls or APIs (Application Program Interface), to various data sources. In at least one embodiment, thesync agent 109 may implement or handle or determine the order of synchronization of the various data classes by specifying directly or indirectly the order. For example, thesync agent 109 may determine and specify that the calendar data class is synchronized first and then the contacts data class is synchronized next and then the To Do list data class is synchronized next, etc. Thesync agent 109, in another embodiment, may receive the order through one or more commands or messages from the sync client and, in turn, may implement that order by sending messages to the data sources in that order. Thesync agent 109 also alerts a data source if a link fails when synchronization is occurring, and it will tell the data source to roll back to a prior synchronization state if the link fails before synchronization is completed. Further, the sync agent may ask a data source to commit changes if the synchronization has been successful, which causes the data source to write the data to a particular store for the particular data class. - The software architecture of
Figure 4 provides abstractions that allow plugging in of many different data classes; including "after market" plug-ins by third party suppliers in at least certain embodiments. In effect, this architecture creates a "sync client" which is split into two pieces (one on the host in the form ofsynch client 111 and one on the device in the form of sync agent 109) and uses a sync server, in the form ofsync services 141, which operates with both thesynch client 111 and thesync agent 109. The device, in an embodiment in this architecture, does not interact directly with the sync server (e.g. sync services 141) but instead exchanges messages with thesync client 111 which interacts (through software based messages) with the sync server. In one embodiment, the Sync Server manages storing, comparing (mingling), and differencing data from various clients (applications, other servers, and Sync Client for a device). The Sync Client, in one embodiment, manages the connection (with authentication and cryptography) to the device, transferring and modifying data between the device and the computer, as well as handling sync anchors, control flow to arbitrate between the sync server and the device, checking versioning of data classes, and providing a plug-in model to optimize and organize handling of different data classes (DataClassHandlers). The Sync Client, in one embodiment, also does all the filtering (only syncing contacts in specific groups, or events in specific calendars, events within a date range, a subset of mail accounts, and notes or note attachments with a size threshold). In one embodiment, SyncAgent has a plug-in model for Data Sources, and runs as a separate process from applications on the device which manage/display the data, but can interact with them in parallel (with locking, or concurrent access), and notifies the applications when data changes. - The device
link software component 107 includes a plurality of software components, such as the layers of software components shown inFigure 10 , and thedevice link 107 maintains, in at least one embodiment, an authenticated connection link between the device and the host, thereby allowing the passing of commands and data between the two data processing systems during the synchronization process. In addition, as shown inFigure 10 , the devicelink software components 107 also provide for, in at least certain embodiments, the connection to be used for additional applications to transfer other information back and forth between the device and the host including, but not limited to, a backup application or a configuration application and diagnostic tools. Further details with respect to thedevice link 107 are provided below in connection withFigures 10 ,11 , and12 . In at least certain embodiments, at least a portion of the device link software stack may reside on both the device and the host memory. In preferred embodiments, a portion of the device link software stack resides and executes on both the device and the host. - The device
link software component 107 provides for a communication link between thesync agent 109 executing on thedevice 101 and thesync client 111 executing on thehost 103. The device link 107 passes software based messages, such as calls and responses to calls, between software components as well as the structured data prepared in a format for synchronization in at least certain embodiments. Thesync client 111 operates, at least in part, to maintain an authenticated connection between the host and device in at least certain embodiments. Moreover, the sync client, in one embodiment, may send device and host anchors as described herein, and may cause the saving of next device and next host anchors in response to a successful synchronization for a particular data class as described further herein. In one embodiment, the sync client will determine the synchronization mode as described further below and will also invoke the correct data class handler for a particular data class to manage the handling of data during the synchronization session for that data class, such as determining the entity types which are to be synchronized for that data class, transforming records to and from the device, determining the order to pull changes from the sync server (sync services) based on entity type, and to perform filtering on records pulled from the sync server (sync services). Thesync client 111 is coupled to a data class handler for each data class which is supported by the host. In the example shown inFigure 4 , there is a data class handler for thecalendar data class 135, and a data class handler for acontacts data class 137, as well as data class handlers for one or moreother data classes 139. Each of these data class handlers is dedicated to providing synchronization services during a synchronization process for a particular data class. For example, when synchronizing calendar data, the data class handler will format calendar data obtained from acalendar data store 143A so that such data may be transmitted to the device for storage on thecalendar store 119. Similarly, the data class handler may format data received from the device so that it may be stored in a database on the host. For example, the data class handler may perform, in at least certain embodiments, reformatting operations on data received from thedevice 101. In at least certain embodiments, the data class handlers for each data class may perform one or more functions for that particular data class. For example, the data class handler may cause the retrieval and storage of structured data from the store for that data class. Furthermore, the data class handler may format data for the device, and may filter structured data when synchronizing data. This filtering may be based upon a group, such as a personal group or business group for a contacts data store or may be based on size, such as for a notes data store as described further below. Moreover, a data class handler may send its version identifier to its corresponding data source for a particular data type on the device and may receive an identifier of the version of the data source for that particular data class. Moreover, a data class handler may create a new filter based on new records sent to the device or received from the device or perform operations with respect to modifying filters, such as a filter based on group or size or other parameters, as a result of the synchronization process, and SyncClient will save the modified filters. Moreover, SyncClient may cause the saving of remapped identifiers obtained from the device for records on the device as described herein. It will be understood that a data class handler for a particular class will typically be executing at the same time as a data source of the same class on the device. These two software components, together with a sync agent on the device and the sync client on the host, form active agents on both data processing systems which are active in executing software components as part of the synchronization process. In one embodiment, the data class handlers may not directly cause the storage and retrieval of structured data from data stores on the host. They transmit messages to thesync client 111 which in turn requests thesync services 141 which may in turn directly or indirectly cause retrieval and storage from the calendar storeddatabase 143A or the contacts storeddatabase 145A or other storeddatabases 147A. In another embodiment, Sync Client drives the saving and retrieval process, and gets data from sync services, and calls out to functions in the Data Class handler. The Sync Client asks the data class handler what entity types to synchronize with sync services. When it gets records it asks the data class handler to transform them for the device (note that the data class handler might return the same record untransformed in many cases). The Sync Client wires the Data Class Handler directly to the Sync Server (sync services) for purposes of filtering, so that the sync server directly asks the DataClassHandler whether or not to filter a record, and then the Sync Client asks the Data Class Handler (both after it has finished pushing records from the device and after it has pulled records from sync services for the device). The Data Class Handler is "responsive;" it responds to requests from the Sync Client (and in the case of filtering, the Sync Server), and it is the Sync Client that is the active agency responsible for controlling the sync operation on the host side. - The host may also include user application programs, such as a
calendar application program 143, acontacts application program 145, andother application programs 147 which are used by a user to access and edit corresponding data classes having structured data stored in a corresponding stored database, such as a calendar storeddatabase 143A. The architecture shown inFigure 4 shows the data stores on the host side as being coupled directly to the application program; it will be appreciated that there is typically a file management system on a host data processing system which manages each database and which receives calls or other requests from software components such as theapplication programs sync services 141 in order to affect reading and writing of data to a particular stored database. - The following tables set out the functions of each of the following software components shown in
Figure 4 : (1) a data source component; (2) sync agent component; (3) sync client component; and (4) data class handler component.TABLE A Data Source Open data source (database or files used to house data) Provide version, determine if can sync if Sync Client (Data Class handler) version is smaller Manage Computer (host) and Device Sync Anchors on device side, determine if can fast or slow sync Coordinate with applications using data from data source Clear all data if being reset Send changed/new/deleted records to Sync Client Coordinate with application(s) for its data class to keep track of which records have changed since last synchronization (Change History) Process and Commit data from Sync Client side Remap record identifiers for new records from Sync Client side TABLE B Sync Agent Manage connection from the device to the Sync Client on computer side Manage control flow/state machine for synchronization operation on device side Interface to DeviceLink for connection layer on device (which also does the authentication and cryptography) Set up the correct Data Source for a given Data Class Provide process infrastructure for synchronization Launch on demand so Sync Client can connect to device to synchronize Cleanly handle connection loss or cancel request from Computer (host) side Handle cancel notification on device side (i.e. from a user interface on the device) to stop synchronizing at user request TABLE C Sync Client Manage connection to Sync Server (sync services) on computer (host), and Sync Agent on device Manage control flow/state machine for synchronization operation on computer (host) side Manage Computer and Device Sync Anchors on computer (host) side Interface to DeviceLink for connection layer on computer (host) (which also does the authentication and cryptography) Set up the correct Data Class Handler and load filtering information for a given Data Class Interface to Sync Server (sync services) - manage sync type (fast, slow, reset) and synchronization operation with Sync Server (sync services) Get changes from Sync Server (sync services) to send to Device Tell Sync Server about remapped record identifiers from Sync Client (Data Source) Cleanly handle connection loss or cancel request from device side Handle cancel notification on computer (host) side (i.e. from a user interface on the computer (host)) to stop synchronizing at user request TABLE D Data Class Handler Provide version, determine if can synchronize if Sync Agent (Data Source) version is smaller (older) Specify which data types to synchronize Provide Filtering on all records Specify which order to pull different record types from Sync Server (sync services) (to make device side processing of added/changed records more efficient) Transform records (e.g. from one format to another format) pulled from Sync Services on computer (Sync Server) to be sent to the device (to optimize transfer and work for device) Transform records (e.g. from one format to another format) from device (Sync Agent/Data Source) to be pushed into SyncServices (to optimize transfer and work for device) -
Figure 5 shows a flow chart indicating various actions and operations which occur on the host and the device over time during a typical synchronization process according to at least one example. The vertical line down the center separates the host operations and actions from the device's operations and actions and also represents the progress of time during a synchronization operation. Thehost 177 may begin the synchronization by connecting to the device and authenticating with the device inoperation 179. This may be a two-way authentication using self-signed certificates and a self-assigned certificate authority from the host. An example of a collection of certificates which may be used in connection with a two-way authentication is shown inFigure 12 . This authentication may be encrypted with public key/private key cryptography so that the security level is relatively high. This will allow a mobile handheld device to be securely authenticated through a WiFi wireless connection or a Bluetooth wireless connection without risk of the device being exposed to other hosts, thereby revealing potentially private and/or confidential data on the device or its host. In response to theconnection operation 179, thedevice 175 responds with aready signal 181. Then inoperation 183, the host indicates that it wants to begin a synchronization operation for data class A (or the next data class) as shown inoperation 183. Typically, synchronization is performed for one data class at a time by one data source and one data class handler on the device and the host, respectively, at least in those embodiments which use the software architecture ofFigure 4 . In response to the signal inoperation 183, the device responds with an acknowledgement inoperation 185 indicating that it is capable of performing a synchronization operation on data class A because it has the necessary software components, such as a data source for the data class A. If the device does not have the necessary software components to perform the synchronization, it will indicate that synchronization cannot proceed. In this manner, at least in certain examples, the device and the host perform automatic checking, without user intervention, for the support to synchronize one or more data classes. This automatic checking of support for each data class may be performed separately for all data classes or selected data classes on both the device and the host. In at least certain examples, the device and/or host may decide, based on dynamic conditions and states, not to synchronize a data class at a particular time. For example, if an application which uses a database having data in the data class is actively using the database, then the device and/or host may not synchronize that data class in the current synchronization process. In response to the acknowledgement fromoperation 185 of the device, the host inoperation 187, sends its version number for the particular data class handler for data class A. In response, the device, inoperation 189, sends its version number for its data source for data class A. In this way, each of the device and the host receive both version numbers and can perform a comparison to determine which software component to use to decide whether and how to synchronize the structured data in data class A. Typically, the higher version number indicates the later version of the software component. Typically, it is preferred to use the later software component to decide whether and how to synchronize for a particular data class. In alternative examples, it may be possible to use the earlier software component. The advantage of using the later software component is that it has knowledge of prior formats, generally, and hence will understand how to deal with prior formats as well as supporting newer formats. In at least one example, if the data source is a later version than the data class handler, then the device will decide how to handle the synchronization if it can be performed. On the other hand, in at least certain examples, if the data class handler on the host is the later version of the software component in this comparison, then the host may decide how to perform the synchronization for the particular data class. Further information in connection with this comparison of version numbers is provided in conjunction with a discussion ofFigures 8A and8B below. - After
operation 189, the host, inoperation 191, sends a next host anchor and the previous device anchor to the device. The device, inoperation 193, sends its next device anchor and the previous host anchor. These anchors are used, as is known in the art, to attempt to make the synchronization operations essentially atomic transactions such that a synchronization is either completed or not and each of the host and the device can recognize that a prior synchronization is incomplete and hence the data was rolled back to its prior state without making changes which would have occurred if a particular synchronization session had been completed. In each ofoperations - After the synchronization type has been negotiated, then in operation 195 a synchronization begins by the host requesting either the changes if it is a fast sync or all records if it is a full or complete sync. Then in
operation 197, the device sends the changes, or all records depending on the type of synchronization, to the host. The host acknowledges in 199 the transmission transactions resulting fromoperation 197. These acknowledgements may be performed at one or more levels, including at a packet level or a record level, etc. A final acknowledgement from the host will cause the device, inoperation 201, to save its next device anchor at the device. As is known in the art, at the end of a successful synchronization, all "next" anchors, such as a next device anchor which has been saved, will become a previous device anchor for use in a future synchronization. In at least one example, the sync agent maintains for each class the previous host anchor as well as the previous device anchor and will create the next device anchor for a particular data class during a synchronization operation. Similarly, in at least one example, the sync client will maintain for each class a previous host anchor and a previous device anchor and may create the next host anchor for use in the processes shown inFigures 5 ,6A ,6B ,7A , and7B . The device may acknowledge afteroperation 201 that it has saved its next device anchor inoperation 201 which will cause the host inoperation 203 to save the next device anchor at the host and to commit to a data store the changes or all records for the particular data class. This may occur by having the data class handler for a particular classrequest sync services 141, or in other examples, a file system software component, to make changes to the database or store for the structured data of the particular data class being synchronized. Then inoperation 205, the device indicates that it is ready to pull. This indicates to the host that the device is ready to accept either changes or all records depending on the synchronization type which was negotiated. In response, the host inoperation 207 sends changes or all records, depending on the synchronization type, and the device acknowledges (operation 211) these data transmissions fromoperation 207 at one or more levels of granularity as indicated above. Then, in one example, inoperation 211, the device sends a map which indicates the relationship between identifiers (ID) for each record maintained at the host relative to a corresponding ID maintained at the device for the same record; in an alternative example, the device may indicate the map information when it acknowledges the records received from the host computer rather than as a separate message in the protocol. It will be appreciated that in alternative implementations, the same identifier may be used, but at least in certain examples, it may be desirable to have a distinct and separate ID maintained by the device for each record which may be different than an ID maintained for that same record on the host. Hence, a map or a relationship between the corresponding IDs may be maintained. In this case, the map is created by the device and transmitted to the host. In response to receiving the record ID map, the host provisionally stores the map indicating the relationships between a device ID for a record and the host ID for the same record. After all records have been sent to the device, and acknowledged from the device (and the record mappings have been provisionally stored on the host), the host transmits a commit request to the device inoperation 213 which will cause the device to save either the changes or all records, depending on the synchronization type, from the current synchronization session to its data store for the current data class. Also, inoperation 215, the device will save the next host anchor. Then in operation 217, the device responds with an acknowledgement signal which will cause the host inoperation 219 to commit the pulled records and to save the next host anchor. The committing of pulled records also commits the provisionally stored map indicating the relationship between a device ID for a record and the host ID for the same record. - The method shown in
Figure 5 is repeated for each data class which is to be synchronized. When all data classes have been synchronized, then the host and the device can disconnect. - It will be appreciated that the method shown in
Figure 5 may be implemented differently in alternative examples; for example, certain operations may be omitted and the order of those operations may be different. For example, the transmission of the version numbers may be omitted or the transmission of the ID map may be omitted. Furthermore, in an alternative example, the order of operations may be altered such that the device pulls changes or all records from the host first before sending its changes or all records to the host. Furthermore, the connection may be initiated by the device rather than the host and the device may perform certain operations that the host performs in the method shown inFigure 5 . -
Figures 6A and6B show a flow chart which illustrates one example of the operations performed by software components on a host, such as the sync client software component as well as a data class handler for a particular data class being synchronized in a synchronization session. The discussion ofFigures 6A ,6B ,7A , and7B will assume that the software architecture shown inFigure 4 is used in the particular example being described for these methods. It will be appreciated that alternative software architectures may also be used with these methods.Operation 251 ofFigure 6A involves determining whether or not the device and the host have been connected by the device link set of software components, such as thedevice link 107. This connection determination may be performed by thesync client 111. Then inoperation 253, it is determined whether there are any further data classes that still require synchronization for a current synchronization session. If none are left, then the device and the host may be disconnected. Then inoperation 255, it is determined whether the device can synchronize the particular data class. This is similar to the automatic checking of support for a particular data class that was described in connection withoperation 185 ofFigure 5 . If the device cannot synchronize a particular data class, then synchronization for that data class is canceled, reverting back tooperation 253. Synchronization for a data class may not be supported if the device does not include a particular data source to support synchronization of the data class. Also, synchronization for the data class might be refused by the device if the data source cannot obtain resources that it needs to synchronize that data class (e.g. as described herein, the application using the data in the data class may refuse to yield to requests to synchronize the data class). If it is supported, then inoperation 257, the sync client obtains the version number of the data source for the current data class being synchronized. This version number is compared to the version number of the data class handler on the host to determine whether they match or are otherwise compatible. This version checking has been described elsewhere and is further illustrated inFigures 8A and8B . If the versions do not match and are not otherwise compatible, then a user interface inoperation 261 may be presented to the user to indicate the need or desirability to update or upgrade one or more software components in order to allow synchronization to be performed. If the versions match or are otherwise compatible, then inoperation 263, the anchors and synchronization type are obtained from the device. This in at least one example results inoperation 193 shown inFigure 5 . Then inoperation 265, the synchronization operation is started, and inoperation 267, the synchronization mode (e.g. one of complete, or changes only, or reset) is negotiated. If reset mode is negotiated inoperation 267, then this is detected inoperation 269 which causes processing to branch tooperation 273 which tells the device to clear all records. If reset mode has not been selected, then the processing selects between either fast synchronization mode as determined inoperation 271 or full/complete synchronization mode, resulting inoperation 275. - In
operation 277, the host asks the device for changes in the current data set if the synchronization is a fast synchronization. The records are processed inoperation 279 at the host and one or more acknowledgement may be sent to the device. The processing of the records inoperation 279 may be performed by the data class handler for the current data class, and this processing may include "mutation" of records and other changes to put the structured data into the proper format for storage in the data store for the current data class. Then, in one example inoperation 281, the host saves the next device anchor, and inoperation 283 it asks sync services, such as thesync services component 141, to prepare to pull, which involves transmitting changes or all records to the device as the second part of synchronization from the host's side. The form of synchronization is determined inoperation 285. If it is a fast synchronization, thenoperation 289 follows. In one example, if it is a slow (complete) synchronization (e.g. a reset synchronization), thenoperation 287 follows. One or more acknowledgments are received from the device; the host may also receive with these acknowledgments from the device a record ID map which shows the relationship between the device ID for a record and the corresponding host ID for that record. This ID map is saved at the host by the data class handler for the current data class. Then inoperation 293, the host sends a message to the device asking whether it can commit to the changes. If not, then synchronization is canceled, leaving the device anchors as they were previously, which indicates an incomplete synchronization when the next synchronization process begins. If the device can confirm commitment, it will do so inoperation 295, which includes receiving a message from the device that it can commit to the changes or all records. At this point, inoperation 297, the host commits the pulled records by saving the ID map it received from the device and saving the next host anchor. In one example, saving of the ID map (recording remapping) is performed only if the commit succeeds and the host commits the pulled records and saves the next host anchor. Then the host proceeds to the next data class by reverting back tooperation 253 inFigure 6A . It will be appreciated that in alternative examples, some of the operations may be omitted or additional operations may be performed and the sequence of operations may be changed relative to that shown inFigures 6A and6B . -
Figures 7A and7B illustrate a method which may be performed by a device in at least certain examples to perform synchronization at the device. This synchronization may employ the software architecture shown inFigure 4 and may also follow the method shown inFigure 5 for the device portion ofFigure 5 . Inoperation 301, the device waits for a connection which may be a wired connection or a wireless connection. Once it is connected inoperation 303, it tells the host that the device is ready for synchronization. Thisoperation 303 may be performed by the sync agent software component ofFigure 4 . Then inoperation 305, the device waits for a request to synchronize data in a particular data class or disconnect. If inoperation 307 it is found that it does not have a data source for a particular data class, then synchronization for that data class will not be performed andoperation 307 reverts back tooperation 305 for the next data class.Operation 307 represents one way in which the device supports automatic checking of support for a particular data class as described elsewhere in this disclosure. If a data source for the data class is found, then a negotiation of version occurs inoperation 309. This negotiation of the version may occur between the data source on the device and the data class handler on the host as described elsewhere and as shown inFigures 8A and8B . After the version has been negotiated inoperation 309, the device obtains anchors from the host and based on those anchors, as described herein, determines the synchronization mode (e.g. full/slow, fast/changes only, or reset). The operations afteroperation 311 select one of the modes and process the data accordingly. If reset mode has been selected, then inoperation 315 all records are marked as cleared. It will be understood that in at least certain examples, the data is not cleared immediately or deleted immediately but rather is marked to be cleared. If fast synchronization is determined to have been selected inoperation 317, then processing proceeds tooperation 321 in which changes are sent for the current data class from the device to the host. If slow synchronization has been selected, then processing proceeds fromoperation 317 tooperation 319 in which all records are sent from the device. After sending all records or sending changes only from the device or marking the records to be cleared,operation 323 saves the next device anchor at the device and clears history at the device. Clear history refers to the change history managed, in at least one example, by the application on the device and the Data Source. As changes are made by the user in an application (e.g. Contacts or Calendar application), the application notes these changes in a Change History which can be consulted by the Sync Agent's Data Source if it can do a "fast sync". The Data Source gets the change history (list of changes since last synchronization) so it knows what records were changed (and can only send over the changed records instead of all records - in a "fast sync"), and after the synchronization (or when doing a reset or slow sync) it clears the change history (the list of changes), so the application can then start building a new list of changes for the next synchronization. Note that there may be a history cursor used to coordinate between the application and the data source, so the data source will only clear history up to the point it used during the synchronization, and the application can add new entries to the history after that, but those history entries after the point used during synchronization will not erroneously be cleared by the Data Source after synchronization. Change History may be maintained by Contacts, Calendars, and Notes applications in at least one example. Processing proceeds fromoperation 323 tooperation 325 in which the device sends a message that it is ready to pull data from the host. The synchronization mode is determined inoperation 327. If a slow/full synchronization is to be performed, then all records inoperation 329 are received from the host. On the other hand, if a fast synchronization is to be performed, then changes from the host are received for the current data class and the device sends back one or more acknowledgments to the host confirming receipt of the data. One or more acknowledgements may also be transmitted from the device to the host for the records received inoperation 329. Then inoperation 333, the device creates a remapping for added records and sends device identifiers for those records to the host. This remapping is typically performed by the data source for the current data class and is transmitted to the data class handler on the host for the current data class, which causes the saving of the mapping between host IDs for a particular record and device IDs for the same record. Then inoperation 335, the sync client on the host asks the sync agent on the device whether the device can commit to the changes. If not, the data source causes a rollback to the prior version of the structured data by not saving the changes from the current synchronization session and, afteroperation 337, processing proceeds to the next data class, which in one example may mean that processing returns back tooperation 305. If the device can commit to the changes, thenoperation 339 is performed in which the device saves the next host anchor and commits the transaction by saving the changes or all records to its store for the current data class and sends a message to the host that the device has committed. -
Figures 8A and8B will now be referred to in connection with examples which utilize version identifiers for the data source and the data host handler in determining whether and how to synchronize for a particular data class the structured data on both the host and the device. After a sync agent on a device and a sync client on a host have begun synchronizing, as inoperation 401, the method ofFigure 8A determines whether there is another data class that needs to be synchronized and identifies that data class. As noted elsewhere, either the sync agent or the sync client may be responsible for selecting the order of synchronization among the various data classes. If there are no data classes left to synchronize, then the synchronization session is ended and the device and host are disconnected for purposes of synchronization inoperation 405. If there are additional data classes to be synchronized, then processing proceeds tooperation 407 in which the next data class begins synchronization by initializing the data class handler on the host for the selected data class and sends that data class handler version number for the current data class to the device. Alternatively, the data source on the device may send its version number to the host. Inoperation 409, the data source initializes itself on the device and compares its version number on the device to the data class handler version number on the host. Then inoperation 411, based on the comparison of the version numbers, it is decided how and whether to synchronize and whether or not an alert needs to be presented to the user to update or upgrade one or more data source software components or data class handler components on the user's device and/or host. In the method ofFigure 8A , it is assumed that one system or the other system makes a decision inoperation 411 based upon the set of version identifiers which is either on the device or the host but not both.Figure 8B represents an alternative implementation in which both systems have both version numbers and can perform the comparison and arrive at the same decision. If a decision was made to synchronize inoperation 411, then inoperation 413 the synchronizing is performed for the current data class, andFigures 5 ,6A ,6B ,7A , and7B provide examples of how synchronization can be performed for a current data class. After synchronization is completed, other operations are performed, such as saving anchors for the current data class inoperation 415, and the process ofFigure 8A reverts back tooperation 403 which has been described previously. It will be appreciated that alternative examples ofFigure 8A may involve fewer operations or more operations and may alter the sequence of those operations in a manner which is different than that shown inFigure 8A . -
Figure 8B shows an example which utilizes version identifiers for each data source software component on a device and for each data class handler software component on the host. In this example, both the host and the device will receive both version numbers and perform the comparison and then decide how and whether to synchronize for the current data class. After the sync agent on the device and the sync client on the host have begun synchronizing inoperation 425, it is determined inoperation 427 whether there are any data classes that need to be synchronized and to select the next data class for synchronization. One or both of the sync agent and the sync client may perform this function inoperation 427. If there are no further data classes to synchronize, then, inoperation 429, synchronization is ended and the device and host may be disconnected under software control. If there is a next data class to synchronize, then, inoperation 431, the data class handler for the current data class on the host is initialized and it causes its version number to be sent to the device. A data source software component for the same current data class on the device is also initialized and its version number is sent to the host. The host and the device each compare the two version numbers and decide, based upon the higher version number, how and whether to synchronize for the current data class. If it is decided to not synchronize for the current data class, one or both systems may display or otherwise present an alert to the user suggesting the user to update and/or upgrade a software component or several software components on at least one of their device and the host. In this case, synchronization for the current data class will not occur and processing reverts back tooperation 427. If, on the other hand, the higher version number software component decides that it is compatible with a lower version number software component on the other system, then synchronization can be performed. Also, if the version numbers match, then synchronization can also be performed. Inoperation 435, synchronization is performed and then inoperation 437 synchronization is completed by, for example, saving anchors and processing other data for the current data class and then processing reverts back tooperation 427. In some examples, the system (host or device) with the higher version may use the version information from the other system in order to take any action necessary to synchronize data to and from the system with the old version. For example, the "old system" might use a different name for some properties, and the system with the higher version can know this and translate the name back and forth. The older system might represent some properties differently, and if they can be translated back and forth the system with the higher version can do that translation coming and going. - Another aspect of at least certain examples described herein relates to a manner in which a software layer for creating and maintaining a data connection for one or more services may be used for each of those services and may provide an interface to one or more stream handlers which implement transport protocols to send structured data, files and other data through a physical interface, such as a wired USB interface or a Bluetooth wireless interface or other wireless interfaces, such as a WiFi interface or a wireless cellular telephone interface. The same layer may also provide for encrypted authentication, and this authentication may be a two-way authentication which establishes an authenticated connection throughout the transmission back and forth between a device and a host through the device link connection layer. The software architecture shown in
Figure 4 shows adevice link 107 which may be implemented in the manner shown inFigure 10 which illustrates a software architecture in which layers of software interface with each other through messages or calls at the interface between the software layers. Thesoftware architecture 450 is shown as having four layers which include a devicelink connection layer 457, astream handler layer 459, and stream libraries layer 465 as well as an upper layer for one or more applications or services, such as a backup application or service or a configuration application or service or synchronization services provided by the sync client software component and the sync agent software component described herein. The sync client and syncagent software components 454 provide the synchronization functions and operations described with respect toFigures 4-8B . Theapplication software component 452 may be a backup application which backs up data, including data which has not been synchronized, or alternatively a configuration application or one or more other types of applications which need to make a connection in a secure and authenticated manner through the devicelink connection layer 457. Thestream handler layer 459 includes one or more stream handlers. In the particular embodiment shown inFigure 10 , there is aUSB stream handler 461 and aBluetooth stream handler 462 and aTCP stream handler 463. These different stream handlers implement the communication protocols and handle the stream over the different interface represented by USB or Bluetooth or TCP (which may be a WiFi or other wireless interface which utilizes TCP/IP). Thestream library layer 465 is called upon by the stream handler to transmit and receive data through the particular protocol represented by the stream handler. For example, the USB stream handler may make calls to a particular group of stream libraries in order to transmit data over a USB interface. Similarly, theBluetooth stream handler 462 may make calls to one or more libraries in thelibraries layer 465 in order to transmit and receive data through a wireless Bluetooth interface. The devicelink connection layer 457 provides a unified interface to all the stream handlers in thestream handlers layer 459 by making calls to the appropriate stream handler based upon the currently used physical interface to connect the device to the host. The devicelink connection layer 457 includes both connection functionality and authentication and/or encryption functionality represented by thesublayers sublayer 456 is responsible for selecting the particular physical interface and establishing a connection through the interface by authenticating, as described below, the host to the device and the device to the host, and at the same time by invoking a particular stream handler for the selected interface which in turn invokes the appropriate stream libraries to create packets or other data structures for transmission over the physical interface. The devicelink connection layer 457 may be responsive to either a user input to synchronize or back up or configure a device, or may be responsive to an automatic discovery of the device through a technology such as Bonjour from Apple Computer, Inc. For example, docking a device in a dock which is coupled to the host may cause Bonjour to recognize that a device has been docked to a host and that the user may desire to synchronize the device. This may cause a display of a user interface asking the user if the device should be synchronized, or alternatively, the device may be automatically synchronized as a result of placing it in the dock. This will then cause the sync agent and sync client to begin a synchronization process as described herein and to also make calls to the device link connection layer in order to transmit data between the host and the device. Calls made by the sync client or the sync agent in the process of synchronization (or calls made by an application such as a backup application 452) result in the devicelink connection layer 457 making software based calls or sending other types of messages to thestream handlers layer 459, which in turn call particular libraries in thestream libraries layer 465. With an architecture such as that shown inFigure 10 , the synchronization software components, such as the sync client and the sync agent components, are isolated from the stream handlers. Thus, a sync agent software component and a sync client software component do not need to implement such handlers. Further, the device connection layer provides a uniform interface which authenticates the device to the host across three different physical interfaces and many different stream handlers; this isolates the synchronization software components as well as the other application components from the authentication software. Hence, a developer of a synchronization client or a synchronization agent or a data source for a data class or a data class handler for a data class do not need to recreate code (e.g. software program) to implement stream handlers or to implement authentication or encryption or to implement software to create the connection between a device and a host. Furthermore, by integrating the authentication and the encryption layer with the device connection layer, all services which use the device connection layer, such as the synchronization services or the application services 452 (e.g. backup applications, configure applications, diagnostic applications, etc.), obtain the benefit of automatic, two-way authentication, in at least certain embodiments, as a result of making calls to the devicelink connection layer 457 which in turn causes authentication and/or encryption to any one of the possible physical interfaces and their corresponding stream handlers. The use of the authentication andencryption layer 458 at a layer of abstraction between the transport and the protocol (stream handler) layers makes the architecture useable by more than just synchronization. - In one embodiment, the architecture shown in
Figure 10 provides a number of useful features.DeviceLink 457 may handle all authentication and encryption automatically for the application (the application may merely have to indicate where to find the certificates used by the security code). Further, the DeviceLink connection authenticates both the device and the host.DeviceLink 457 may provide asynchronous behavior for all stream handlers (transports) doing I/O between the device and host, so the transport just has to read/write synchronously, andDeviceLink 457 manages the thread control to make it appear as asynchronous to the application, so the application never blocks reading and writing - the application (such as Sync Client on the host or Sync Agent on the device) is notified of incoming data (and other related things, such as connection/disconnection) via callbacks.DeviceLink 457 does all the authorization at the top of the stream (transport) layer, so all transport types which may be plugged in get authentication and encryption without needing to implement anything special. In one embodiment,Device Link 457 may have file transfer facilities built directly into DeviceLink's protocol. This may be used for backup, and other tools (and can be used in future applications based on device link 457). The protocol ofDeviceLink 457 may include a function to do efficient transfer of a file in pieces, so that a file does not have to be read completely in memory at one time. Further,DeviceLink 457 may provide Unix style "stat" information (by itself, or with the file), such as the size of the file and the last modified date, so the applications can keep track of the file's state to tell if it needs to copy it or not (this may be useful for incremental backups). Once connected viaDeviceLink 457, an application can use the protocol to request information about a file, and to request the file itself. The file is sent in chunks to avoid reading a huge file into memory all at once (on both sides).DeviceLink 457 may provide some default behavior when the file is requested to just get the file and send it (so the application doesn't need to respond to the callback for the request and take explicit action), although the application can respond if it wants to do custom handling (and use its own code if it wants). Similarly, when receiving pieces of a file, a default callback handles simply writing the file to disk, but that may be overridden in some embodiments.DeviceLink 457 may provide a "white list" of which files (or directories) can be requested, and which files or directories can be written into, so the two sides can control access. Other file copying solutions on the device may also exist independently ofDeviceLink 457; for example, a media player (e.g. iTunes) may provide file copying facilities; however,DeviceLink 457 provides considerable infrastructure (authentication, asynchronous interface, part of the existing DeviceLink protocol for ease of use by an application), and has more functionality then a simple file copy API (it has the white lists, and default handling which can be overridden, and chunks the files). - An example of a sequence of operations which involve the use of device
link connection layer 457 will now be provided. In one embodiment, a synchronization initiator (for example, eitherSync Agent 109 on the device orSync Client 111 on the host) will be launched (e.g. by the user or by the system, such as by a Bonjour discovery process). The initiator will then try to connect to the other side. The initiator, throughDeviceLink connection layer 457, will establish a basic (unauthenticated) connection, which causes the launching of the other application (e.g. ifSync Client 111 initiates the process then basic connection may cause the launching ofSync Agent 109 on the device; conversely, ifSync Agent 109 initiates the process then basic connection may cause the launching ofSync Client 109 on the host). At this point, theDeviceLink connection layer 457 attempts to perform a two-way authentication process, described further herein; if that process succeeds, then an authenticated connection between the host and the device has been created and the synchronization initiator gets a callback from theDeviceLink connection layer 457 that the connection was made and the connectee application (that was launched by the basic connection) gets a notification that an incoming connection was made; for example, if authentication is successful and ifSync Client 111 was the initiator, then SyncClient 111 will receive the callback andSync Agent 109 is the connectee application. If authentication fails, the initiator receives a connection failed callback and there is no connection, and the connectee will normally exit after some time interval. -
Figure 11 illustrates an alternative example of the operations of a devicelink connection layer 457. Inoperation 501, a connection is established. This may be performed by discovering the device. For example, Bonjour may be used to discover the device, either when connected through a wireless connection or a wired connection to the host. The device link connection layer may then decide which interface to use, and there may be a priority associated with each of those interfaces based upon speed, security, and convenience. For example, USB may be the highest priority connection interface followed by WiFi and finally Bluetooth, in at least certain embodiments. After an interface has been selected, then inoperation 503 the device link connection layer performs authentication between the host and the device. In at least certain examples, this authentication is two-way, meaning that each of the device and the host perform authentication operations with certificates created upon initialization.Figure 12 shows an example of the collection of certificates that the device and host may have after initialization of both in a manner described herein. In certain examples, authentication may be optional. After authentication is performed, then inoperation 505 the device connection layer or other software may cause the launching of a sync client and sync agent in order to begin synchronization. While synchronization is occurring, the device link connection layer maintains the connection, which may be maintained as an authenticated connection, during the synchronization process of structured data inoperation 507. In alternative examples, the method ofFigure 11 may be used with non-synchronization services, such as the backup application or configureapplication 452. In this case, the connection may be maintained, and it may be an authenticated connection during those services. After synchronization or other services are complete, the device link connection layer may disconnect the device from the host in software, even though the device may still be in the dock of the host. In other words, the software connection is torn down as a result of ending the synchronization process or other process which invoked the devicelink connection layer 457. -
Figure 12 shows an example of data structures maintained at both a device and a host after performing an initialization of an authentication system which provides two-way authentication between the device and the host. The authentication is encrypted with public key/private key cryptography, thereby providing a high level of security to allow a device to be synchronized to a host through a wireless interface while maintaining sufficient security so that the user can be assured that other hosts will not be able to obtain access to data on either the device being synchronized or the host. Moreover, this two-way authentication may be used for file transfers between the device and the host and for other services (e.g. diagnostic services) which utilize the authenticated connection. In order to provide adequate security, the device may be required to be connected by a wired interface initially and the user may be asked, by the display of the device, to enter a value, such as a large number or other character string, into the host. Alternatively, the value may be displayed on the display of the host and the user may be required to enter that value or character string into the device. Following this operation, the device may create a private and public key pair and save its private key. The host may perform a similar operation to create a private key of the host and a corresponding public key of the host. The host may also create a certificate for a self-created certificate authority and may further create a public key/private key pair for the certificate authority. Each of the device and the host may include an identifier which may be a unique identifier for each system, and each of these identifiers may be transmitted to the other side (device ID transmitted to host and host ID transmitted to device) and this identifier is mapped to the saved private key of a particular system. In the example shown inFigure 12 , the saved private key of thedevice 529 for its host is mapped to the host's ID which is provided by the host. Similarly, the device'sID 535 for that device is mapped to the private key of thehost 531. The host may create a certificate and sign it with a certificate authority using the host's public key, optionally with additional information. The host may also create a device certificate and sign it with the certificate authority certificate and then may transmit these certificates (537, 541, and 545) to the device. These certificates can be used in known techniques, such as a secure socket layer handshake, to provide transport layer security and to provide a two-way authentication between the device and the host. This authentication may be maintained during the entire connection, which may include a synchronization operation and other operations utilizing this authenticated connection. In one example, as shown inFigure 12 , the device has a mapping between a host identifier and the following: Device private key used for that host, device certificate used for that host, host certificate, host certificate authority certificate (used in the self-signed authentication). Similarly, the host has a mapping from a device ID to the following: Host private key used for the device, host certificate used for that device, device certificate, host certificate authority certificate used with that device. The device has a separate device private key for any host it communicates with (the private key maps to the device certificate used with that host, and the device has one device certificate per host), and there is a similar arrangement on the host side, as there is a separate private key host certificate pair per device. -
Figures 13A and13B relate to an aspect of at least certain embodiments described herein. This aspect involves the ability for one or both of the device and the host to have both non-synchronization processes and synchronization processes occurring concurrently in that they are both being executed by one or more processing systems. Both sets of processes or threads may be in different address spaces. This allows a user of a device to operate the device while it is being synchronized, and similarly allows a user of the host to operate the host while the host is synchronizing with the device. For example, if both the device and the host have these capabilities, then a user on the device may be viewing a calendar program which displays a calendar of the user showing events and possibly To Do items for the user while at the same time a synchronization service is synchronizing the calendar data on the device with calendar data on the host. This synchronization may be implemented using the software architecture shown inFigure 4 and may further use the methods shown inFigures 5-7B . Similarly, the user may use an application program on the host to access and edit the calendar data or other structured data for other applications while at the same time the host is performing synchronization operations on structured data in one or more stores of structured data. The synchronization process may be implemented on the host using the architecture shown inFigure 4 and using the methods shown inFigures 5-7B , which have been described above. - The non-synchronization threads or processes may be user-level or non-user-level threads or processes which are not synchronization tasks. The synchronization threads or processes are synchronization tasks performed by one or more synchronization software components such as
Sync Agent 109 orSync Client 111 or other synchronization software components. The concurrent execution of the non-synchronization threads or processes and the synchronization threads or processes may occur on one or both of the device and the host.Operation 575 inFigure 13A shows that non-synchronization threads or processes may be performed on both the device and the host. Inoperation 577, execution of synchronization software begins on, in this embodiment, both the device and the host while execution of non-synchronization threads or processes continues on both the device and the host. Inoperation 579, a synchronization software component, such as theSync Agent 109, attempts to acquire a lock on a store for a data class which is to be synchronized.Sync Agent 109 in one embodiment may do this by invoking the Unix FLOCK call to lock the file containing, for example, the bookmarks to be synchronized. Also in one embodiment, if a synchronization software component accesses an SQlite database, if may not need to acquire a lock as the database may handle this function itself. In one embodiment, Contacts, Calendars and Notes may be stored in databases which handle their own locking at a lower level. Also in one embodiment, Sync Client may not attempt to acquire any locks. If the lock is acquired, as determined inoperation 580, then synchronizing is begun inoperation 591. On the other hand, if the lock is not acquired then the synchronization component, inoperation 581, may notify the application using the data class that the synchronization component requests the lock and the synchronization component waits for a response. The application may receive a response indicating the lock is acquired, in which case processing proceeds tooperation 591; otherwise, if the lock is not acquired after the notification, the processing proceeds tooperation 583 in which synchronizing of the current data class is canceled andoperation 579 follows if further data classes need to be synchronized (otherwise the process ends). If, while synchronizing is being performed, the user attempts to change the store for the data class being synchronized, the system (e.g. either the device or the host) may present, inoperation 593, an alert to the user that the system cannot accept changes until synchronizing is completed. After synchronization for the current data class is completed, inoperation 595, the lock is released and processing proceeds to the next data class, if one still remains to be synchronized, or synchronization is finished. - It will be appreciated that in alternative embodiments, only one of the host and the device may support concurrent operation of non-synchronization processes and synchronization processes..
- Another aspect of at least certain examples described herein relate to methods and systems for synchronizing bookmarks or favorites on one or both of the device and the host when synchronizing structured data. The bookmarks of various web browsers on each of the device and the host may be collected together and stored in an intermediate or canonical topology which is used to synchronize the bookmarks and collections of bookmarks on at least two web browsers, one being on the device and one being on the host. In certain examples, there may be multiple web browsers operating or used by a user on the host and one web browser used on the device. The intermediate topology collects the various bookmarks from the different web browsers, aggregates those into the canonical topology, and then uses that topology to synchronize the bookmark structures for each of the web browsers on such a system. In addition, the synchronizing may also include converting between one format (e.g. a URL data type to another format (e.g. a string representing the URL) for each of the one or more bookmarks in each web browser.
- The synchronization of bookmarks on different browsers may require a mechanism to convert or otherwise deal with the difference in the format of the hierarchy of bookmarks. For example, different web browsers have different data structures for maintaining a hierarchy of a collection of bookmarks. Each of these data structures may be considered a topology.
Figures 14A, 14B, 14C, and 14D provide examples of those different topologies. The example shown inFigure 14A may be the topology of the web browser known as Safari from Apple Computer, Inc. of Cupertino, while the topology shown inFigure 14B may be the topology of Internet Explorer from Microsoft Corporation, and the topology shown inFigure 14C may be the topology of Firefox, and the topology shown inFigure 14D may be the topology of a web browser on a device, such as a handheld computer with wireless cellular telephone capabilities or other wireless interfaces, such as WiFi, which may be used to access the Internet and browse the Internet. The topologies shown inFigures 14A, 14B, 14C, and 14D represent the topology prior to synchronization among the web browsers. Thetopology 625 includes abookmarks menu 627 and abookmarks bar 629 as well as one ormore folders 631 which may be arranged in ahierarchy including folders topology 637 inFigure 14B does not include a bookmarks menu but does include abookmarks bar 638. Another difference between thetopology 637 and thetopology 625 is the existence of bookmarks at a top level in the topology, such as thebookmarks topology 625, there is no support for bookmarks at the top level; in other words, the bookmarks must be within a folder or in the bookmarks menu or in the bookmarks bar. In contrast, the topology of 637 supports bookmarks at the top level, such as thebookmarks topology 637 also includes a collection of one or more folders which may be arranged in a hierarchy, such asfolders 641 andfolders topology 651 is similar to thetopology 625 except that bookmarks at the top level, such asbookmarks topology 651 but they are not included or allowed in thetopology 625. Thetopology 651 includes abookmarks menu 652, abookmarks bar 653, bookmarks at the top level, such asbookmarks folders -
Figures 15A, 15B, 15C, and 15D show how the bookmark topologies appear after a synchronization between the collections of bookmarks for the different web browsers. The designation "A" as been added to each reference numeral to indicate that it is the same element except after synchronization. For example, thebookmarks menu 627A is the same as thebookmarks menu 627 except that it may include additional bookmarks as a result of the synchronization operation. It can be seen that synchronization has caused the addition of atop level folder 675 which may contain top level bookmarks from other topologies, such as thebookmarks structure 625A to accommodate bookmarks for top level bookmarks in other web browsers. Similarly, thetopology 637A has now included, after synchronization, abookmarks menu 676 which incorporates the bookmarks found in thebookmarks menu Figure 15D has been modified to include atop level folder 677 in order to accommodate bookmarks at the top level from other web browsers. Hence, in the example shown inFigures 15A, 15B, 15C, and 15D , a synchronization process among multiple web browsers has resulted in the addition of bookmarks and folders and other data structures to the different topologies in order to synchronize the bookmarks among the different web browsers. This synchronization was able to occur even though the topologies for the bookmark structures of the different web browsers are different. The synchronizing which occurred is a form of synchronization which does not delete a bookmark in one web browser if it is not present in another. This synchronization may be implemented through an intermediate topology, such as a canonical topology. An example of such a topology is shown inFigure 16A along with a topology for a host's web browser bookmark structure and a device's web browser bookmark structure. A mapping relationship is also shown between the canonical topology and each of the other twotopologies bookmark bar 638A are mapped to bookmarks in thebookmark bar 692 in the canonical topology. Similarly,top level bookmarks top level folder 693 in the canonical topology. Similarly, folders and bookmarks within thosefolders 641A are mapped tofolders 694 in thecanonical topology 690. Bookmarks in thebookmark menu 691 of the canonical topology are mapped toother bookmarks 669A. This mapping relationship allows conversion during synchronization from one set of bookmarks on a device or a host to another set of bookmarks in another web browser on the device or the host. -
Figures 16B and16C illustrate two methods for synchronizing bookmarks.Operation 701 ofFigure 16B maps at least one bookmark from at least one web browser on a host to at least one of an intermediate topology or a device topology for bookmarks. For example, thetop level bookmarks intermediate topology 690 or directly mapped to thedevice topology 665A. Inoperation 703, at least one bookmark from at least one web browser on the device is mapped to at least one of an intermediate topology or the host's topology for bookmarks. An example of this mapping may be the mapping which occurs in bookmarks added to the top level folder in thetopology 665A, which in turn are mapped to the top level bookmarks in thetopology 637A. The mapping, inoperation operation 705. In that operation, bookmarks are synchronized on a device with bookmarks on the host. As noted inoperation 705, the device's bookmark topology may be different from the host's topology, and different than the intermediate topology as is shown inFigure 16A . - The method of
Figure 16C assumes that an intermediate topology is used and that there is a mapping between each of the web browsers and the intermediate topology. It will be understood that at least in certain examples, the host or the device may maintain a complete data structure of all bookmarks in the intermediate topology which can then be used to update the bookmark structure of each web browser. Inoperation 715, first bookmarks in a first topology for a first web browser on a host are mapped to an intermediate topology which may be maintained on the host or the device. Inoperation 717, second bookmarks in a second topology for a second web browser on the host are also mapped into the intermediate topology. Then inoperation 719, the first bookmarks and the second bookmarks on the host are synchronized with third bookmarks on a device which is coupled to the host during the synchronizing period. In this particular method, two different web browsers having two different topologies on the host are synchronized with a web browser on the device. In at least certain examples, the device's topology for its web browser may be different than the first topology and different than the second topology and the intermediate topology. - In an example, the system may perform this synchronization automatically without user interaction and without requesting any input from a user. While this may reduce the complexity required to configure such a system, it may be desirable to present one or more user interfaces which allow a user to set preference settings or other settings which indicate how the synchronization of bookmarks is to be performed among two or more web browsers. The
user interface 725 shown inFigure 16D allows a user to select one option from three possible options by selecting one of the threecheck boxes check box 727 indicates that a user has selected the first option which synchronizes the device's bookmarks to the host's bookmarks and the host's bookmarks to the device's bookmarks; this is considered a two-way synchronization. The other two options are one-way only synchronizations. In particular, if the user had selectedcheck box 729, then synchronization would be performed only to synchronize from the device's bookmarks to the host's bookmarks. If the user had selectedcheck box 731, then synchronization would be performed from the host's bookmarks to the device's bookmarks only. -
Figure 16E illustrates another user interface which allows a user to select all web browsers for synchronization or only selected ones of the web browsers. If the user selects thecheck box 737, then synchronization is performed for all web browsers on both the device and the host. Theinterface 735 shows that the user has selected the second option by selecting thecheck box 739. In this case, the system will synchronize bookmarks with bookmarks of selected web browsers on the host, and the user has selectedbuttons buttons user interface 735. The selection of thebutton 744 will cause an application browser window to appear to display applications on the host to allow the user to pick selected applications from the list to include in the set of web browsers to be synchronized on the host. - The
user interface 750 shown inFigure 16F allows the user to limit synchronization to selected folders. This option has not been selected as can be seen by the absence of a check mark in thecheck box 751. If the user does selectcheck box 751, then one or more browser windows may be caused to appear to allow a user to browse through windows containing lists of various bookmarks and bookmark folders, and bookmark bars on a system. It will be appreciated that each of these user interfaces may be used individually or in combination to allow a user to control how bookmarks are synchronized in at least certain examples described herein. -
Figure 17 relates to another aspect of at least certain examples described herein. This aspect relates to the synchronization of setup information for one or more electronic message system accounts, such as an email account or an instant messaging account. This synchronization may be performed in a one-way direction from the host to the device rather than in both directions. Moreover, in at least certain examples, modifications made to an account setup information on the host may not be reflected on a previously set up account which has been established and is existing on the device. - The flow chart of
Figure 17 provides one example of how account information may be synchronized.Figure 18 shows a memory structure of the device and a memory structure of the host with respect to email account setup information. The method ofFigure 17 may begin inoperation 781 in which a data processing system receives setup information for an email account (or for other types of electronic message systems). This information is received on the device and may be for an account "A." Thesetup information 791 may be an example, inFigure 18 , of such setup information. Inoperation 783, the host may receive information to set up an email account which may be account "B" and is shown assetup information 795 inFigure 18 . Synchronization may occur after establishing a connection between the device and the host as inoperation 785. During thesynchronization operation 787, account B, which was established on the host, may be synchronized as a new account on the device. The synchronization may be a one-way synchronization in at least one example; this is represented by thearrow 790 shown inFigure 18 . In this case, the email account which was set up on the device is not synchronized back to the host. In this example, the device ends up having a superset of the email accounts. This may be desirable in cases where the user prefers greater privacy on the device than the host, for example. - It will be appreciated that in alternative examples, the direction of synchronization may be reversed such that it is from the device to the host and not from the host to the device. In this case, any account set up on the device will be synchronized and established on the host, but not vice versa.
-
Figures 19 ,20 , and21 relate to another aspect of at least certain examples described herein. This aspect relates to how notes may be synchronized. In at least certain examples, a note, which is typically a text freeform document, may contain other information, such as image data, audio data, movie data, and even To Do items. The To Do items may be embedded within the note and may be created as part of creating the note. When the note is synchronized, the To Do item is also synchronized in a separate To Do database in at least certain examples. Further information in connection with notes having embedded To Do items may be found in co-pendingU.S. Patent Application No. 11/499,009, filed on August 4, 2006 -
Figure 19 shows one exemplary method for synchronizing a note which contains one or more embedded To Do's on either a host or a device. The note itself may be treated as one data class, while the To Do item will be treated as, in at least certain examples, another data class. If the architecture ofFigure 4 is utilized, then a portion of the note is synchronized for the data source and the data class handler for the note store while another portion of the note is synchronized with another data store and another data class handler for the To Do data class. In an alternative example, the note with an embedded To Do may be synchronized to merely one database or store rather than two through the use of only one pair of a data store and a data class handler. Inoperation 811, the note with an embedded To Do is stored on a host or a device. This will cause the updating of a To Do database on the host (or the device) inoperation 813. When synchronization occurs inoperation 815, the note database on the device is synchronized and the To Do database on the device is also synchronized. If the note was stored on the device inoperation 811, then the note database on the host is synchronized and the To Do database on the host is synchronized inoperation 815. In this manner, different parts of the note are synchronized to two different data stores. -
Figure 20 provides an example of how an embedded note may be created. Inoperation 825, a system, such as a device or a host, receives content of the note. This content may be a freeform text document but may also include image data, such as a picture or other graphics. Then inoperation 827, the system receives a selection of a command to create a To Do item from at least a portion of the content of the note. This selection may occur, in certain examples, before receiving the content. Then inoperation 829, a To Do item is added to a To Do database. This new To Do item may optionally be presented to the user in a To Do window or other user interface item. -
Figure 21 shows an example of how a note or other type of structured data may be synchronized or not depending on a filter. In the case of a note, the filter may be the size of the note to prevent the systems from attempting to synchronize a very large note which contains either a lot of text or image data. Inoperation 841, a connection is established to synchronize notes on a device to notes on a host. Inoperation 843, it is determined if a synchronization filter for notes has been set, either by the system, such as a default, or by the user. As synchronization is performed,operation 845 is also performed for each note which is to be synchronized between the host and the device. This operation involves determining whether or not the note satisfies the filter. In one example, the filter may be a maximum size of the note. If the note exceeds the maximum size, then it will not be synchronized or only text portions will be synchronized. This is shown inoperation 849. If the note does satisfy the filter, then it is synchronized as shown inoperation 847. This is repeated for each note which is to be synchronized. In another example, rather than not synchronizing larger notes at all, a method may synchronize text and/or other small portions of such larger notes and include an indicator or marker in the synchronized copy (which has been reduced in size by the removal of the image or other data) that a portion of the original note (e.g. the image data portion) has not been included in the synchronized copy. In this way, synchronization of at least a portion of larger notes can still be performed while filtering out, in the synchronization process itself, the larger parts of the note. - Another aspect of at least certain examples relate to transformations of data as part of the synchronization process between the host and the device. Examples of these transformations include: converting data types such as a URL to a text string (e.g., in synchronizing bookmarks) or converting date formats for calendar events or converting contact images, etc. In each case, the device and the host may use a different format; for example, the device may use a first date format for calendar events and the host may use a second date format for calendar events. In one example, the Data Class Handler for a data class on the host may perform the transformations for that data class for both the host and the device as noted in Table D. In other examples, the Data Source on the device for a data class and the Data Class Handler on the host for that data class may share the tasks of transforming between formats for that data class.
- Further information will now be provided with respect to transformation of image formats. For example, the device may support contact images (e.g. for a contacts or address book application on the device) having a richer (e.g. more varied) format than contact images (for contacts or address book application on the host) on the host. Further, the device may store previously clipped versions of an image and previously scaled versions of images for a contact so it can display them quickly.
- On the host, there may be just one small image for a contact's picture. This image can be fairly large if set via API (Application Program Interface) from another application, but if created in a contacts or address application on a host, it may be small, and if it is created from an original image that is larger, that original image is lost. In contrast, on the device, in one example, the original image which was used to create a contact image may be maintained in its entirety. For example, a user can pick images from a photo or camera application and apply them as a contact's image - these can be any size, so the user may choose the visible area of the image to use, and that visible area is, if necessary, scaled (e.g. scaled down) so it fits on the screen. The device may store a clip rectangle which the user chooses (though some user interface) to choose the portion of that image to be displayed. The device may also store clipped and scaled images for a rectangular-sized and square-sized image. The rectangular image may be the size of the screen, and may be shown on an incoming call. The square image may be shown scaled down even smaller as part of the contact, and used in situations where there is only some of the screen (a square area) which is available to display the image. In one example, when the user chooses the clip rectangle, the user interface shows how the rectangular and square images will look. If the user wants to regenerate what the device displays, the user will, in this example, still have the original image, so the user can go back to the original image and choose another clip rectangle, and regenerate the saved images in rectangular and square sizes and shapes.
- Synchronization of contacts/address book, at least in one example, includes synchronizing the images in the contacts/address book and this includes synchronizing the clip rectangle as well as the original image. The synchronizing process may also have to regenerate the optimized images in certain cases, such as if the user changes the image in their Address Book on the host, or if the user gets an image from a device and synchronizes it to another device (e.g., the user gets an image from a device with one sized screen and wants to synchronize it to a device with a differently sized screen). The Data Class Handler may, in one example, clip/scale new/changed images when synchronizing them onto the device because that may be faster than having the device do it (and the device may also be memory constrained. Because there might be more than one device synchronizing the same contact images, and those devices could have different sized displays, in one example, separate clip rectangles are saved for each unique device display size, so an image can be clipped differently on one device with a different size than another device. The Data Class Handler in one example manages keeping track of the different rectangles (since each device will only know about the one rectangle that matches its screen size). For example, if a device has 320x480 screen, and a contact image is originally 1024x800, the synchronization process stores optimized images for the entire screen (320x480) and a square 320x320 representation as well. The user can pick the clip rectangle out of the original image which is then scaled down to 320x480 (and the device cuts out a 320x320 part), and this is synchronized to the host. If the image changes on the host, the synchronization process (through the Data Class Handler, for example) recomputes the 320x480 and 320x320 images for the device. If a new image is synchronized to a device with a different size, if the original image is still large enough to cover the screen, the synchronization process, in one example, will find the center of the image in the clip area for one of the existing clip rectangles (for the other size device screen), and expand/contract the clip rectangle accordingly to fit the different size (e.g. larger size) screen. If the new device has a smaller screen, the synchronizing process may merely scale the image down to that size.
- Another aspect of at least certain examples relate to frameworks and architecture for synchronizing widgets. Generally, widgets are user interface elements that include information and one or more tools that let the user perform tasks and/or provide access to information. Widgets can perform a variety of tasks, including, for example, communicating with a remote server or other source of data to provide information to a user (e.g., weather report; stock prices; sunrise/sunset times; current phase of the moon; current exchange rates; etc.), providing commonly needed functionality (e.g., a calculator; a calendar; a clock; etc.), or acting as an information repository (e.g., a notebook). Widgets can be displayed and accessed through an environment referred to as a "unified interest layer," "dashboard layer," "dashboard environment," or "dashboard." Widgets and dashboards are described in co-pending
U.S. Patent Application No. 10/877,968 , entitled "Unified Interest Layer for User Interface," filed on June 25, 2004, which patent application is incorporated herein by reference in its entirety. - Widgets on a device may be synchronized, using any one of the examples described herein, with widgets on a host or another device. The synchronization may be one-way (from device to host or another device only or from host or another device to device only) or two-way. In the case of two-way synchronizations, both systems will normally end up with a common set of widgets, assuming both systems can support the full, common set of widgets.
- Widgets may be treated, at least in certain examples, as another data class and may be synchronized using the architecture shown in
Figure 4 and described throughout this disclosure. In one example, a Data Source for widgets may exist on a device and a Data Class Handler for widgets may exist on a host. The executable software which implements the widget may not be synchronized but the configuration settings for the widget may be synchronized between a device and a host or between a device and another device. Each widget on a system may have configuration settings and these settings may be stored as one file for a particular type of widget. For example, a weather widget may have settings which specify three cities (e.g. San Francisco, Los Angeles, and Washington, D.C.) and those settings are stored as one file or record for purposes of synchronization.
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will be evident that various modifications may be made thereto. The specification and drawings are, accordingly, to be regarded in an illustrative sense.
Claims (12)
- A machine implemented method for synchronization between a device (101) and a host (103), wherein the device (101) and the host (103) are physically separated and a link software component maintains an authenticated connection link between the device (101) and the host (103), thereby allowing passing of commands and data between the device (101) and the host (103) during the synchronization process,
wherein- multiple different data classes are synchronized between the device (101) and the host (103), the different data classes being structured data having different structures or formats;- the device (101) includes one or more user application programs for accessing and editing structured data in a particular data class- both of the device and the host are able to have both non-synchronization processes and synchronization processes occurring concurrently, wherein the synchronization threads or processes are synchronization tasks performed by one or more synchronization software components such as Sync Agent (109)the method comprises:- beginning the execution of synchronization software on both the device (101) and the host (103) while execution of non-synchronization threads or processes continues on both the device (101) and the host (103)- after performing the above step, the synchronization software of the device (101) or the host (103) carrying out the following sequence of stepsa) acquiring a lock (579) on a store for a data class which is to be synchronizedb) determining (580) if the lock was acquiredc) if the lock is acquired, beginning synchronizing (591) for the currently processed data classd) if the lock is not acquired notifying (581) the application which uses the currently processed data class that the synchronization component requests the lock and the synchronization component waits for a responsee) if the lock is not acquired after the notification, cancelling synchronizing (583) of the current data class, and if further data classes need to be synchronized, proceeding to step a) for further data classes, and if there are no further classes that need to be synchronized ending the processf) if a response is received from the application indicating that the lock is acquired, beginning synchronizing (591) for the currently processed data classh) after synchronization for the current data class is completed (595), releasing the locki) if at least one data class still remains to be synchronized proceeding back (599) to step a) and if there are no more data classes to be synchronized, ending the process (600). - The synchronization method of claim 1 wherein the non-synchronization threads or processes may be user-level or non-user-level threads or processes which are not synchronization tasks.
- The synchronization method of claim 1 or 2 wherein while synchronizing is being performed, if the user attempts to change the store for the data class being synchronized, presenting an alert to the user that the system cannot accept changes until synchronizing is completed.
- The synchronization method of any of claims 1 to 3, wherein the data class is one of: (a) calendar data; (b) contact data; (c) email account setup information; (d) bookmarks; (e) notes; and (f) To Do items.
- A computer readable storage medium containing executable program instructions for synchronization between a device (101) and a host (103), wherein the device (101) and the host (103) are physically separated and a link software component maintains an authenticated connection link between the device (101) and the host (103), thereby allowing passing of commands and data between the device (101) and the host (103) during the synchronization process,
wherein- multiple different data classes are synchronized between the device (101) and the host (103), the different data classes being structured data having different structures or formats;- the device (101) includes one or more user application programs for accessing and editing structured data in a particular data class- both of the device and the host are able to have both non-synchronization processes and synchronization processes occurring, wherein the synchronization threads or processes are synchronization tasks performed by one or more synchronization software components such as Sync Agent (109)
the instructions when executed by the device (101) and the host (103), cause the device and the host to- begin the execution of synchronization software on both the device (101) and the host (103) while execution of non-synchronization threads or processes continues on both the device (101) and the host (103)- after performing the above step, the instructions when executed by the device or the host cause the synchronization software of the device (101) or the host to carry out the following sequence of stepsa) acquiring a lock (579) on a store for a data class which is to be synchronizedb) determining (580) if the lock was acquiredc) if the lock is acquired, beginning synchronizing (591) for the currently processed data classd) if the lock is not acquired notifying (581) the application which uses the currently processed data class that the synchronization component requests the lock and the synchronization component waits for a responsee) if the lock is not acquired after the notification, cancelling synchronizing (583) of the current data class, and if further data classes need to be synchronized, proceeding to step a) for further data classes, and if there are no further classes that need to be synchronized ending the processf) if a response is received from the application indicating that the lock is acquired, beginning synchronizing (591) for the currently processed data classh) after synchronization for the current data class is completed (595), releasing the locki) if at least one data class still remains to be synchronized proceeding back (599) to step a) and if there are no more data classes to be synchronized, ending the process (600). - The computer readable storage medium of claim 5, wherein the non-synchronization threads or processes may be user-level or non-user-level threads or processes which are not synchronization tasks.
- The computer readable storage medium of claims 5 or 6 wherein while synchronizing is being performed, if the user attempts to change the store for the data class being synchronized, presenting an alert to the user that the system cannot accept changes until synchronizing is completed.
- The computer readable storage medium of claim of any of claims 5 to 7, wherein the data class is one of: (a) calendar data; (b) contact data; (c) email account setup information; (d) bookmarks; (e) notes; and (f) To Do items.
- A data processing system comprising a device and a host (103) which are physically separated from each other comprising:a link software component which maintains an authenticated connection link between the device (101) and the host (103), thereby allowing passing of commands and data between the device (101) and the host (103) during a synchronization process, wherein- multiple different data classes are synchronized between the device (101) and the host (103), the different data classes being structured data having different structures or formats;- the device (101) includes one or more user application programs for accessing and editing structured data in a particular data class- both the device and the host are able to have both non-synchronization processes and synchronization processes occurring concurrently, wherein the synchronization threads or processes are synchronization tasks performed by one or more synchronization software components such as a Sync Agent (109)- the execution of synchronization software begins on both the device (101) and the host (103) while execution of non-synchronization threads or processes continues on both the device (101) and the host (103)- the device and the host are configured to- begin the execution of synchronization software on both the device (101) and the host (103) while execution of non-synchronization threads or processes continues on both the device (101) and the host (103)- after performing the above step, the synchronization software of the device (101) or the host (103) carries out the following sequence of stepsa) acquiring a lock (579) on a store for a data class which is to be synchronizedb) determining (580) if the lock was acquiredc) if the lock is acquired, beginning synchronizing (591) for the currently processed data classd) if the lock is not acquired notifying (581) the application which uses the currently processed data class that the synchronization component requests the lock and the synchronization component waits for a responsee) if the lock is not acquired after the notification, cancelling synchronizing (583) of the current data class, and if further data classes need to be synchronized, proceeding to step a) for further data classes, and if there are no further classes that need to be synchronized ending the processf) if a response is received from the application indicating that the lock is acquired, beginning synchronizing (591) for the currently processed data classh) after synchronization for the current data class is completed (595), releasing the locki) if at least one data class still remains to be synchronized proceeding back (599) to step a) and if there are no more data classes to be synchronized, ending the process (600).
- The device (101) or host (103) of claim 9, wherein the non-synchronization threads or processes may be user-level or non-user-level threads or processes which are not synchronization tasks.
- The device (101) or host (103) of claim 9 or 10 wherein while synchronizing is being performed, if the user attempts to change the store for the data class being synchronized, presenting an alert to the user that the system cannot accept changes until synchronizing is completed.
- The device (101) or host (103) of any of claims 9 to 11, wherein the data class is one of: (a) calendar data; (b) contact data; (c) email account setup information; (d) bookmarks; (e) notes; and (f) To Do items.
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/650,730 US7778971B2 (en) | 2007-01-07 | 2007-01-07 | Synchronization methods and systems |
US11/650,729 US7805403B2 (en) | 2007-01-07 | 2007-01-07 | Synchronization methods and systems |
US11/650,624 US7761414B2 (en) | 2007-01-07 | 2007-01-07 | Asynchronous data synchronization amongst devices |
US11/650,721 US20080163743A1 (en) | 2007-01-07 | 2007-01-07 | Synchronization methods and systems |
US11/650,728 US8239504B2 (en) | 2007-01-07 | 2007-01-07 | Synchronization methods and systems |
US11/650,726 US7739410B2 (en) | 2007-01-07 | 2007-01-07 | Synchronization methods and systems |
PCT/US2008/000087 WO2008085869A2 (en) | 2007-01-07 | 2008-01-04 | Synchronization methods and systems |
Publications (3)
Publication Number | Publication Date |
---|---|
EP2115627A2 EP2115627A2 (en) | 2009-11-11 |
EP2115627A4 EP2115627A4 (en) | 2012-02-08 |
EP2115627B1 true EP2115627B1 (en) | 2017-10-18 |
Family
ID=39609258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP08712962.3A Active EP2115627B1 (en) | 2007-01-07 | 2008-01-04 | Synchronization methods and systems |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2115627B1 (en) |
KR (5) | KR101138549B1 (en) |
WO (1) | WO2008085869A2 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7778971B2 (en) | 2007-01-07 | 2010-08-17 | Apple Inc. | Synchronization methods and systems |
US7739410B2 (en) | 2007-01-07 | 2010-06-15 | Apple Inc. | Synchronization methods and systems |
US8239504B2 (en) | 2007-01-07 | 2012-08-07 | Apple Inc. | Synchronization methods and systems |
US7660831B2 (en) | 2007-01-07 | 2010-02-09 | Apple Inc. | Synchronization methods and systems |
US7761414B2 (en) | 2007-01-07 | 2010-07-20 | Apple Inc. | Asynchronous data synchronization amongst devices |
US7805403B2 (en) | 2007-01-07 | 2010-09-28 | Apple Inc. | Synchronization methods and systems |
WO2009032708A2 (en) | 2007-09-04 | 2009-03-12 | Apple Inc. | Protocol for remote user interface for portable media device |
US10567498B2 (en) | 2012-07-27 | 2020-02-18 | Samsung Electronics Co., Ltd. | Terminal and server performing data synchronization |
KR101420574B1 (en) * | 2013-08-29 | 2014-07-17 | 지현구 | Method and device for automatically switching communication between multi communication device |
JP6629994B2 (en) * | 2016-12-22 | 2020-01-15 | 日本電信電話株式会社 | Data processing system and data processing method |
US10979300B2 (en) * | 2019-06-20 | 2021-04-13 | Kaloom Inc. | Computing device and methods for synchronizing networking information with a topology server |
CN112749228B (en) * | 2019-10-31 | 2024-01-26 | 北京金山云网络技术有限公司 | Data synchronization method, device, storage server and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6324544B1 (en) * | 1998-10-21 | 2001-11-27 | Microsoft Corporation | File object synchronization between a desktop computer and a mobile device |
US6460051B1 (en) * | 1998-10-28 | 2002-10-01 | Starfish Software, Inc. | System and methods for synchronizing datasets in a communication environment having high-latency or other adverse characteristics |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6708221B1 (en) | 1996-12-13 | 2004-03-16 | Visto Corporation | System and method for globally and securely accessing unified information in a computer network |
US6671757B1 (en) | 2000-01-26 | 2003-12-30 | Fusionone, Inc. | Data transfer and synchronization system |
GB2377518B (en) | 2001-02-12 | 2003-10-22 | Altio Ltd | Client software enabling a client to run a network based application |
US6971084B2 (en) | 2001-03-02 | 2005-11-29 | National Instruments Corporation | System and method for synchronizing execution of a batch of threads |
US20040093342A1 (en) * | 2001-06-27 | 2004-05-13 | Ronald Arbo | Universal data mapping system |
US7596565B2 (en) | 2001-08-07 | 2009-09-29 | Good Technology | System and method for maintaining wireless file folders at a wireless device |
AU2003223382A1 (en) | 2002-03-29 | 2003-10-13 | Good Technology, Inc. | System and method for full wireless synchronization of a data processing apparatus with a data service |
DK1495610T3 (en) * | 2002-04-15 | 2008-09-22 | Nokia Corp | Method and device for handling synchronization-related information |
US20050147130A1 (en) | 2003-12-23 | 2005-07-07 | Intel Corporation | Priority based synchronization of data in a personal area network |
-
2008
- 2008-01-04 WO PCT/US2008/000087 patent/WO2008085869A2/en active Application Filing
- 2008-01-04 KR KR1020097016485A patent/KR101138549B1/en active IP Right Grant
- 2008-01-04 EP EP08712962.3A patent/EP2115627B1/en active Active
- 2008-01-04 KR KR1020117019241A patent/KR101212858B1/en active IP Right Grant
- 2008-01-04 KR KR1020117019239A patent/KR101210161B1/en active IP Right Grant
- 2008-01-04 KR KR1020117019242A patent/KR101190426B1/en active IP Right Grant
- 2008-01-04 KR KR1020117019240A patent/KR101212872B1/en active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6324544B1 (en) * | 1998-10-21 | 2001-11-27 | Microsoft Corporation | File object synchronization between a desktop computer and a mobile device |
US6460051B1 (en) * | 1998-10-28 | 2002-10-01 | Starfish Software, Inc. | System and methods for synchronizing datasets in a communication environment having high-latency or other adverse characteristics |
Non-Patent Citations (2)
Title |
---|
OLAF ZWINTZSCHER: "Software-Komponenten im Überblick", 2005, W2L-VERLAG, Bochum, ISBN: 3-937137-60-2, pages: 20 - 26 * |
WIKIPEDIA: "Modul (Software)", 30 October 2006 (2006-10-30), Retrieved from the Internet <URL:http://de.wikipedia.org/w/index.php?title=Modul_(Software)&oldid=23206899> [retrieved on 20140509] * |
Also Published As
Publication number | Publication date |
---|---|
WO2008085869A2 (en) | 2008-07-17 |
KR101190426B1 (en) | 2012-10-12 |
KR101212872B1 (en) | 2012-12-17 |
KR101210161B1 (en) | 2012-12-07 |
KR101212858B1 (en) | 2012-12-17 |
KR20110110329A (en) | 2011-10-06 |
EP2115627A2 (en) | 2009-11-11 |
KR20110110331A (en) | 2011-10-06 |
WO2008085869A3 (en) | 2009-04-02 |
KR20110110328A (en) | 2011-10-06 |
KR101138549B1 (en) | 2012-05-21 |
EP2115627A4 (en) | 2012-02-08 |
KR20090096553A (en) | 2009-09-10 |
KR20110110330A (en) | 2011-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10891301B2 (en) | Synchronization methods and systems | |
US7660831B2 (en) | Synchronization methods and systems | |
US7991738B2 (en) | Synchronization methods and systems | |
US7739410B2 (en) | Synchronization methods and systems | |
US7761414B2 (en) | Asynchronous data synchronization amongst devices | |
US8375112B2 (en) | Synchronization methods and systems | |
EP2115627B1 (en) | Synchronization methods and systems | |
US20080163743A1 (en) | Synchronization methods and systems | |
CN101682634B (en) | File protocol for transaction based communication | |
US20060200570A1 (en) | Discovering and mounting network file systems via ad hoc, peer-to-peer networks | |
CN101682635B (en) | Multiplexed data stream protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090803 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA MK RS |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1138079 Country of ref document: HK |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 13/00 20060101ALI20111215BHEP Ipc: H04L 29/08 20060101ALI20111215BHEP Ipc: G06F 9/00 20060101ALI20111215BHEP Ipc: G06F 3/00 20060101ALI20111215BHEP Ipc: G06F 17/00 20060101AFI20111215BHEP Ipc: G06F 17/30 20060101ALN20111215BHEP |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20120111 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 3/00 20060101ALI20120103BHEP Ipc: G06F 17/00 20060101AFI20120103BHEP Ipc: H04L 29/08 20060101ALI20120103BHEP Ipc: G06F 13/00 20060101ALI20120103BHEP Ipc: G06F 9/00 20060101ALI20120103BHEP Ipc: G06F 17/30 20060101ALN20120103BHEP |
|
17Q | First examination report despatched |
Effective date: 20140519 |
|
17Q | First examination report despatched |
Effective date: 20140707 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602008052531 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: G06F0017000000 Ipc: G06F0017300000 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 17/00 20060101AFI20170406BHEP Ipc: H04L 29/08 20060101ALI20170406BHEP Ipc: G06F 17/30 20060101ALN20170406BHEP Ipc: G06F 3/00 20060101ALI20170406BHEP Ipc: G06F 9/00 20060101ALI20170406BHEP Ipc: G06F 13/00 20060101ALI20170406BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 17/00 20060101AFI20170407BHEP Ipc: G06F 17/30 20060101ALN20170407BHEP Ipc: G06F 3/00 20060101ALI20170407BHEP Ipc: H04L 29/08 20060101ALI20170407BHEP Ipc: G06F 9/00 20060101ALI20170407BHEP Ipc: G06F 13/00 20060101ALI20170407BHEP |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/08 20060101ALI20170418BHEP Ipc: G06F 17/30 20060101AFI20170418BHEP |
|
INTG | Intention to grant announced |
Effective date: 20170511 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA MK RS |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 938531 Country of ref document: AT Kind code of ref document: T Effective date: 20171115 Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602008052531 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20171018 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 938531 Country of ref document: AT Kind code of ref document: T Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180118 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1138079 Country of ref document: HK |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180218 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180118 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180119 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PCOW Free format text: NEW ADDRESS: ONE APPLE PARK WAY, CUPERTINO CA 95014 (US) |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602008052531 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
RAP2 | Party data changed (patent owner data changed or rights of a patent transferred) |
Owner name: APPLE INC. |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
26N | No opposition filed |
Effective date: 20180719 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180104 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20180928 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20180131 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602008052531 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: G06F0017300000 Ipc: G06F0016000000 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180104 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180104 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20080104 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20221130 Year of fee payment: 16 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230526 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20231130 Year of fee payment: 17 |